首页 > 最新文献

Proceedings of the 30th Annual Computer Security Applications Conference最新文献

英文 中文
IMSI-catch me if you can: IMSI-catcher-catchers 如果你能抓住我,就抓住我
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664272
Adrian Dabrowski, N. Pianta, Thomas Klepp, M. Mulazzani, E. Weippl
IMSI Catchers are used in mobile networks to identify and eavesdrop on phones. When, the number of vendors increased and prices dropped, the device became available to much larger audiences. Self-made devices based on open source software are available for about US$ 1,500. In this paper, we identify and describe multiple methods of detecting artifacts in the mobile network produced by such devices. We present two independent novel implementations of an IMSI Catcher Catcher (ICC) to detect this threat against everyone's privacy. The first one employs a network of stationary (sICC) measurement units installed in a geographical area and constantly scanning all frequency bands for cell announcements and fingerprinting the cell network parameters. These rooftop-mounted devices can cover large areas. The second implementation is an app for standard consumer grade mobile phones (mICC), without the need to root or jailbreak them. Its core principle is based upon geographical network topology correlation, facilitating the ubiquitous built-in GPS receiver in today's phones and a network cell capabilities fingerprinting technique. The latter works for the vicinity of the phone by first learning the cell landscape and than matching it against the learned data. We implemented and evaluated both solutions for digital self-defense and deployed several of the stationary units for a long term field-test. Finally, we describe how to detect recently published denial of service attacks.
IMSI捕获器用于移动网络中识别和窃听电话。当供应商数量增加,价格下降时,更多的用户可以使用该设备。基于开源软件的自制设备售价约为1500美元。在本文中,我们识别并描述了检测此类设备在移动网络中产生的伪影的多种方法。我们提出了两个独立的新颖的IMSI Catcher Catcher (ICC)实现,以检测针对每个人隐私的这种威胁。第一种方法采用安装在地理区域内的固定(sICC)测量单元网络,不断扫描所有频段以获取小区公告并对小区网络参数进行指纹识别。这些安装在屋顶上的设备可以覆盖很大的区域。第二种实现是针对标准消费级移动电话(mICC)的应用程序,不需要对它们进行root或越狱。其核心原理是基于地理网络拓扑相关性,促进了当今手机中无处不在的内置GPS接收器和网络蜂窝功能指纹识别技术。后者通过首先学习手机的情况,然后将其与学习到的数据进行匹配,在手机附近工作。我们实施并评估了这两种数字自卫解决方案,并部署了几个固定单元进行长期现场测试。最后,我们描述了如何检测最近发布的拒绝服务攻击。
{"title":"IMSI-catch me if you can: IMSI-catcher-catchers","authors":"Adrian Dabrowski, N. Pianta, Thomas Klepp, M. Mulazzani, E. Weippl","doi":"10.1145/2664243.2664272","DOIUrl":"https://doi.org/10.1145/2664243.2664272","url":null,"abstract":"IMSI Catchers are used in mobile networks to identify and eavesdrop on phones. When, the number of vendors increased and prices dropped, the device became available to much larger audiences. Self-made devices based on open source software are available for about US$ 1,500. In this paper, we identify and describe multiple methods of detecting artifacts in the mobile network produced by such devices. We present two independent novel implementations of an IMSI Catcher Catcher (ICC) to detect this threat against everyone's privacy. The first one employs a network of stationary (sICC) measurement units installed in a geographical area and constantly scanning all frequency bands for cell announcements and fingerprinting the cell network parameters. These rooftop-mounted devices can cover large areas. The second implementation is an app for standard consumer grade mobile phones (mICC), without the need to root or jailbreak them. Its core principle is based upon geographical network topology correlation, facilitating the ubiquitous built-in GPS receiver in today's phones and a network cell capabilities fingerprinting technique. The latter works for the vicinity of the phone by first learning the cell landscape and than matching it against the learned data. We implemented and evaluated both solutions for digital self-defense and deployed several of the stationary units for a long term field-test. Finally, we describe how to detect recently published denial of service attacks.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133855860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
A security evaluation of AIS automated identification system AIS自动识别系统的安全评价
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664257
Marco Balduzzi, A. Pasta, Kyle Wilhoit
AIS, Automatic Identification System, is an application of cyber-physical systems (CPS) to smart transportation at sea. Being primarily used for collision avoidance and traffic monitoring by ship captains and maritime authorities, AIS is a mandatory installation for over 300,000 vessels worldwide since 2002. Other promoted benefits are accident investigation, aids to navigation and search and rescue (SAR) operations. In this paper, we present a unique security evaluation of AIS, by introducing threats affecting both the implementation in online providers and the protocol specification. Using a novel software-based AIS transmitter that we designed, we show that our findings affect all transponders deployed globally on vessels and other maritime stations like lighthouses, buoys, AIS gateways, vessel traffic services and aircraft involved in SAR operations. Our concerns have been acknowledged by online providers and international standards organizations, and we are currently and actively working together to improve the overall security.
AIS,即自动识别系统,是信息物理系统(CPS)在海上智能交通中的应用。AIS系统主要用于船舶船长和海事当局的避碰和交通监控,自2002年以来,全球超过30万艘船舶强制安装了AIS系统。其他提升的好处包括事故调查、导航辅助和搜救(SAR)行动。在本文中,我们通过介绍影响在线提供商和协议规范实现的威胁,提出了一种独特的AIS安全评估。使用我们设计的基于软件的新颖AIS发射机,我们表明我们的发现影响了全球部署在船舶和其他海上站(如灯塔、浮标、AIS网关、船舶交通服务和涉及SAR操作的飞机)上的所有转发器。我们的担忧已经得到了在线提供商和国际标准组织的认可,我们目前正在积极合作,以提高整体安全性。
{"title":"A security evaluation of AIS automated identification system","authors":"Marco Balduzzi, A. Pasta, Kyle Wilhoit","doi":"10.1145/2664243.2664257","DOIUrl":"https://doi.org/10.1145/2664243.2664257","url":null,"abstract":"AIS, Automatic Identification System, is an application of cyber-physical systems (CPS) to smart transportation at sea. Being primarily used for collision avoidance and traffic monitoring by ship captains and maritime authorities, AIS is a mandatory installation for over 300,000 vessels worldwide since 2002. Other promoted benefits are accident investigation, aids to navigation and search and rescue (SAR) operations. In this paper, we present a unique security evaluation of AIS, by introducing threats affecting both the implementation in online providers and the protocol specification. Using a novel software-based AIS transmitter that we designed, we show that our findings affect all transponders deployed globally on vessels and other maritime stations like lighthouses, buoys, AIS gateways, vessel traffic services and aircraft involved in SAR operations. Our concerns have been acknowledged by online providers and international standards organizations, and we are currently and actively working together to improve the overall security.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Whitewash: outsourcing garbled circuit generation for mobile devices 粉饰:为移动设备外包乱码电路
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664255
Henry Carter, Chaz Lever, Patrick Traynor
Garbled circuits offer a powerful primitive for computation on a user's personal data while keeping that data private. Despite recent improvements, constructing and evaluating circuits of any useful size remains expensive on the limited hardware resources of a smartphone, the primary computational device available to most users around the world. In this work, we develop a new technique for securely outsourcing the generation of garbled circuits to a Cloud provider. By outsourcing the circuit generation, we are able to eliminate the most costly operations from the mobile device, including oblivious transfers. Our proofs of security show that this technique provides the best security guarantees of any existing garbled circuit outsourcing protocol. We also experimentally demonstrate that our new protocol, on average, decreases execution time by 75% and reduces network costs by 60% compared to previous outsourcing protocols. In so doing, we demonstrate that the use of garbled circuits on mobile devices can be made nearly as practical as it is becoming for server-class machines.
乱码电路为计算用户的个人数据提供了强大的原语,同时保持了数据的私密性。尽管最近有所改进,但在智能手机有限的硬件资源上,构建和评估任何有用尺寸的电路仍然很昂贵。智能手机是世界上大多数用户可用的主要计算设备。在这项工作中,我们开发了一种新技术,用于安全地将乱码电路的生成外包给云提供商。通过外包电路生成,我们能够从移动设备中消除最昂贵的操作,包括遗忘传输。我们的安全性证明表明,该技术提供了任何现有的乱码电路外包协议的最佳安全保证。我们还通过实验证明,与以前的外包协议相比,我们的新协议平均减少了75%的执行时间,减少了60%的网络成本。通过这样做,我们证明了在移动设备上使用乱码电路几乎可以像在服务器级机器上一样实用。
{"title":"Whitewash: outsourcing garbled circuit generation for mobile devices","authors":"Henry Carter, Chaz Lever, Patrick Traynor","doi":"10.1145/2664243.2664255","DOIUrl":"https://doi.org/10.1145/2664243.2664255","url":null,"abstract":"Garbled circuits offer a powerful primitive for computation on a user's personal data while keeping that data private. Despite recent improvements, constructing and evaluating circuits of any useful size remains expensive on the limited hardware resources of a smartphone, the primary computational device available to most users around the world. In this work, we develop a new technique for securely outsourcing the generation of garbled circuits to a Cloud provider. By outsourcing the circuit generation, we are able to eliminate the most costly operations from the mobile device, including oblivious transfers. Our proofs of security show that this technique provides the best security guarantees of any existing garbled circuit outsourcing protocol. We also experimentally demonstrate that our new protocol, on average, decreases execution time by 75% and reduces network costs by 60% compared to previous outsourcing protocols. In so doing, we demonstrate that the use of garbled circuits on mobile devices can be made nearly as practical as it is becoming for server-class machines.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131343931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Towards a scalable resource-driven approach for detecting repackaged Android applications 朝着一个可扩展的资源驱动的方法来检测重新打包的Android应用程序
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664275
Yuru Shao, Xiapu Luo, Chenxiong Qian, Peng Fei Zhu, Lei Zhang
Repackaged Android applications (or simply apps) are one of the major sources of mobile malware and also an important cause of severe revenue loss to app developers. Although a number of solutions have been proposed to detect repackaged apps, the majority of them heavily rely on code analysis, thus suffering from two limitations: (1) poor scalability due to the billion opcode problem; (2) unreliability to code obfuscation/app hardening techniques. In this paper, we explore an alternative approach that exploits core resources, which have close relationships with codes, to detect repackaged apps. More precisely, we define new features for characterizing apps, investigate two kinds of algorithms for searching similar apps, and propose a two-stage methodology to speed up the detection. We realize our approach in a system named ResDroid and conduct large scale evaluation on it. The results show that ResDroid can identify repackaged apps efficiently and effectively even if they are protected by obfuscation or hardening systems.
重新打包的Android应用程序(或简称应用程序)是移动恶意软件的主要来源之一,也是应用程序开发商严重损失收入的重要原因。虽然已经提出了许多检测重新打包应用程序的解决方案,但大多数解决方案严重依赖于代码分析,因此受到两个限制:(1)由于十亿操作码问题而导致的可扩展性差;(2)代码混淆/应用程序加固技术的不可靠性。在本文中,我们探索了一种替代方法,利用与代码密切相关的核心资源来检测重新打包的应用程序。更准确地说,我们定义了表征应用程序的新特征,研究了两种搜索类似应用程序的算法,并提出了一种两阶段的方法来加快检测速度。我们在一个名为ResDroid的系统中实现了我们的方法,并对其进行了大规模的评估。结果表明,ResDroid可以高效地识别重新打包的应用程序,即使它们受到混淆或强化系统的保护。
{"title":"Towards a scalable resource-driven approach for detecting repackaged Android applications","authors":"Yuru Shao, Xiapu Luo, Chenxiong Qian, Peng Fei Zhu, Lei Zhang","doi":"10.1145/2664243.2664275","DOIUrl":"https://doi.org/10.1145/2664243.2664275","url":null,"abstract":"Repackaged Android applications (or simply apps) are one of the major sources of mobile malware and also an important cause of severe revenue loss to app developers. Although a number of solutions have been proposed to detect repackaged apps, the majority of them heavily rely on code analysis, thus suffering from two limitations: (1) poor scalability due to the billion opcode problem; (2) unreliability to code obfuscation/app hardening techniques. In this paper, we explore an alternative approach that exploits core resources, which have close relationships with codes, to detect repackaged apps. More precisely, we define new features for characterizing apps, investigate two kinds of algorithms for searching similar apps, and propose a two-stage methodology to speed up the detection. We realize our approach in a system named ResDroid and conduct large scale evaluation on it. The results show that ResDroid can identify repackaged apps efficiently and effectively even if they are protected by obfuscation or hardening systems.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
CPS: market analysis of attacks against demand response in the smart grid CPS:智能电网需求响应攻击的市场分析
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664284
C. Barreto, A. Cárdenas, N. Quijano, E. Mojica-Nava
Demand response systems assume an electricity retail-market with strategic electricity consuming agents. The goal in these systems is to design load shaping mechanisms to achieve efficiency of resources and customer satisfaction. Recent research efforts have studied the impact of integrity attacks in simplified versions of the demand response problem, where neither the load consuming agents nor the adversary are strategic. In this paper, we study the impact of integrity attacks considering strategic players (a social planner or a consumer) and a strategic attacker. We identify two types of attackers: (1) a malicious attacker who wants to damage the equipment in the power grid by producing sudden overloads, and (2) a selfish attacker that wants to defraud the system by compromising and then manipulating control (load shaping) signals. We then explore the resiliency of two different demand response systems to these fraudsters and malicious attackers. Our results provide guidelines for system operators deciding which type of demand-response system they want to implement, how to secure them, and directions for detecting these attacks.
需求响应系统假设电力零售市场具有战略电力消费代理。这些系统的目标是设计负载塑造机制,以实现资源效率和客户满意度。最近的研究工作在需求响应问题的简化版本中研究了完整性攻击的影响,其中消耗负载的代理和对手都不是战略性的。在本文中,我们研究了考虑战略参与者(社会规划师或消费者)和战略攻击者的完整性攻击的影响。我们确定了两种类型的攻击者:(1)恶意攻击者,他们想通过产生突然过载来破坏电网中的设备;(2)自私的攻击者,他们想通过妥协和操纵控制(负载整形)信号来欺骗系统。然后,我们探讨了两种不同的需求响应系统对这些欺诈者和恶意攻击者的弹性。我们的结果为系统操作员决定他们想要实现哪种类型的需求响应系统,如何保护它们以及检测这些攻击的方向提供了指导。
{"title":"CPS: market analysis of attacks against demand response in the smart grid","authors":"C. Barreto, A. Cárdenas, N. Quijano, E. Mojica-Nava","doi":"10.1145/2664243.2664284","DOIUrl":"https://doi.org/10.1145/2664243.2664284","url":null,"abstract":"Demand response systems assume an electricity retail-market with strategic electricity consuming agents. The goal in these systems is to design load shaping mechanisms to achieve efficiency of resources and customer satisfaction. Recent research efforts have studied the impact of integrity attacks in simplified versions of the demand response problem, where neither the load consuming agents nor the adversary are strategic. In this paper, we study the impact of integrity attacks considering strategic players (a social planner or a consumer) and a strategic attacker. We identify two types of attackers: (1) a malicious attacker who wants to damage the equipment in the power grid by producing sudden overloads, and (2) a selfish attacker that wants to defraud the system by compromising and then manipulating control (load shaping) signals. We then explore the resiliency of two different demand response systems to these fraudsters and malicious attackers. Our results provide guidelines for system operators deciding which type of demand-response system they want to implement, how to secure them, and directions for detecting these attacks.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Differentially private data aggregation with optimal utility 具有最佳效用的差异私有数据聚合
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664263
F. Eigner, Matteo Maffei, I. Pryvalov, F. Pampaloni, Aniket Kate
Computing aggregate statistics about user data is of vital importance for a variety of services and systems, but this practice has been shown to seriously undermine the privacy of users. Differential privacy has proved to be an effective tool to sanitize queries over a database, and various cryptographic protocols have been recently proposed to enforce differential privacy in a distributed setting, e.g., statical queries on sensitive data stored on the user's side. The widespread deployment of differential privacy techniques in real-life settings is, however, undermined by several limitations that existing constructions suffer from: they support only a limited class of queries, they pose a trade-off between privacy and utility of the query result, they are affected by the answer pollution problem, or they are inefficient. This paper presents PrivaDA, a novel design architecture for distributed differential privacy that leverages recent advances in secure multiparty computations on fixed and floating point arithmetics to overcome the previously mentioned limitations. In particular, PrivaDA supports a variety of perturbation mechanisms (e.g., the Laplace, discrete Laplace, and exponential mechanisms) and it constitutes the first generic technique to generate noise in a fully distributed manner while maintaining the optimal utility. Furthermore, PrivaDA does not suffer from the answer pollution problem. We demonstrate the efficiency of PrivaDA with a performance evaluation, and its expressiveness and flexibility by illustrating several application scenarios such as privacy-preserving web analytics.
计算关于用户数据的汇总统计对于各种服务和系统都是至关重要的,但这种做法已被证明会严重损害用户的隐私。差分隐私已被证明是清理数据库查询的有效工具,最近已经提出了各种加密协议来在分布式设置中强制执行差分隐私,例如,对存储在用户侧的敏感数据进行静态查询。然而,差分隐私技术在现实生活中的广泛应用受到现有结构的几个限制的影响:它们只支持有限的查询类别,它们在隐私和查询结果的实用性之间进行权衡,它们受到答案污染问题的影响,或者它们效率低下。本文介绍了PrivaDA,这是一种用于分布式差分隐私的新型设计架构,它利用了固定和浮点算法上安全多方计算的最新进展来克服前面提到的限制。特别是,PrivaDA支持各种扰动机制(例如,拉普拉斯、离散拉普拉斯和指数机制),它构成了第一个在保持最佳效用的同时以完全分布式的方式产生噪声的通用技术。此外,PrivaDA没有答案污染问题。我们通过性能评估来展示PrivaDA的效率,并通过举例说明隐私保护web分析等几个应用场景来展示它的表现力和灵活性。
{"title":"Differentially private data aggregation with optimal utility","authors":"F. Eigner, Matteo Maffei, I. Pryvalov, F. Pampaloni, Aniket Kate","doi":"10.1145/2664243.2664263","DOIUrl":"https://doi.org/10.1145/2664243.2664263","url":null,"abstract":"Computing aggregate statistics about user data is of vital importance for a variety of services and systems, but this practice has been shown to seriously undermine the privacy of users. Differential privacy has proved to be an effective tool to sanitize queries over a database, and various cryptographic protocols have been recently proposed to enforce differential privacy in a distributed setting, e.g., statical queries on sensitive data stored on the user's side. The widespread deployment of differential privacy techniques in real-life settings is, however, undermined by several limitations that existing constructions suffer from: they support only a limited class of queries, they pose a trade-off between privacy and utility of the query result, they are affected by the answer pollution problem, or they are inefficient. This paper presents PrivaDA, a novel design architecture for distributed differential privacy that leverages recent advances in secure multiparty computations on fixed and floating point arithmetics to overcome the previously mentioned limitations. In particular, PrivaDA supports a variety of perturbation mechanisms (e.g., the Laplace, discrete Laplace, and exponential mechanisms) and it constitutes the first generic technique to generate noise in a fully distributed manner while maintaining the optimal utility. Furthermore, PrivaDA does not suffer from the answer pollution problem. We demonstrate the efficiency of PrivaDA with a performance evaluation, and its expressiveness and flexibility by illustrating several application scenarios such as privacy-preserving web analytics.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"412 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124400805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Lightweight authentication of freshness in outsourced key-value stores 外包键值存储中新鲜度的轻量级身份验证
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664244
Y. Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang
Data outsourcing offers cost-effective computing power to manage massive data streams and reliable access to data. Data owners can forward their data to clouds, and the clouds provide data mirroring, backup, and online access services to end users. However, outsourcing data to untrusted clouds requires data authenticity and query integrity to remain in the control of the data owners and users. In this paper, we address the authenticated data-outsourcing problem specifically for multi-version key-value data that is subject to continuous updates under the constraints of data integrity, data authenticity, and "freshness" (i.e., ensuring that the value returned for a key is the latest version). We detail this problem and propose IncBM-Tree, a novel construct delivering freshness and authenticity. Compared to existing work, we provide a solution that offers (i) lightweight signing and verification on massive data update streams for data owners and users (e.g., allowing for small memory footprint and CPU usage for a low-budget IT department), (ii) immediate authentication of data freshness, (iii) support of authentication in the presence of both real-time and historical data accesses. Extensive benchmark evaluations demonstrate that IncBM-Tree achieves higher throughput (in an order of magnitude) for data stream authentication than existing work. For data owners and end users that have limited computing power, IncBM-Tree can be a practical solution to authenticate the freshness of outsourced data while reaping the benefits of broadly available cloud services.
数据外包为管理大量数据流和可靠的数据访问提供了经济有效的计算能力。数据所有者可以将数据转发到云,云为最终用户提供数据镜像、备份和在线访问服务。然而,将数据外包到不可信的云需要数据真实性和查询完整性,以保持在数据所有者和用户的控制之下。在本文中,我们专门针对在数据完整性、数据真实性和“新鲜度”(即确保为键返回的值是最新版本)的约束下不断更新的多版本键值数据,解决了经过身份验证的数据外包问题。我们详细介绍了这个问题,并提出了一种新颖的结构,即IncBM-Tree,它提供了新鲜感和真实性。与现有的工作相比,我们提供了一个解决方案,它提供了(i)为数据所有者和用户提供大量数据更新流的轻量级签名和验证(例如,为低预算的IT部门提供小内存占用和CPU使用),(ii)数据新鲜度的即时认证,(iii)支持实时和历史数据访问的认证。广泛的基准评估表明,与现有的工作相比,IncBM-Tree在数据流身份验证方面实现了更高的吞吐量(以一个数量级)。对于计算能力有限的数据所有者和最终用户来说,IncBM-Tree是一种实用的解决方案,既可以验证外包数据的新鲜度,又可以从广泛可用的云服务中获益。
{"title":"Lightweight authentication of freshness in outsourced key-value stores","authors":"Y. Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang","doi":"10.1145/2664243.2664244","DOIUrl":"https://doi.org/10.1145/2664243.2664244","url":null,"abstract":"Data outsourcing offers cost-effective computing power to manage massive data streams and reliable access to data. Data owners can forward their data to clouds, and the clouds provide data mirroring, backup, and online access services to end users. However, outsourcing data to untrusted clouds requires data authenticity and query integrity to remain in the control of the data owners and users. In this paper, we address the authenticated data-outsourcing problem specifically for multi-version key-value data that is subject to continuous updates under the constraints of data integrity, data authenticity, and \"freshness\" (i.e., ensuring that the value returned for a key is the latest version). We detail this problem and propose IncBM-Tree, a novel construct delivering freshness and authenticity. Compared to existing work, we provide a solution that offers (i) lightweight signing and verification on massive data update streams for data owners and users (e.g., allowing for small memory footprint and CPU usage for a low-budget IT department), (ii) immediate authentication of data freshness, (iii) support of authentication in the presence of both real-time and historical data accesses. Extensive benchmark evaluations demonstrate that IncBM-Tree achieves higher throughput (in an order of magnitude) for data stream authentication than existing work. For data owners and end users that have limited computing power, IncBM-Tree can be a practical solution to authenticate the freshness of outsourced data while reaping the benefits of broadly available cloud services.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
New models of cache architectures characterizing information leakage from cache side channels 描述缓存侧通道信息泄漏的缓存架构新模型
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664273
Tianwei Zhang, R. Lee
Side-channel attacks try to breach confidentiality and retrieve critical secrets through the side channels. Cache memories are a potential source of information leakage through side-channel attacks, many of which have been proposed. Meanwhile, different cache architectures have also been proposed to defend against these attacks. However, there are currently no means for comparing and evaluating the effectiveness of different defense solutions against these attacks. In this paper, we propose a novel method to evaluate a system's vulnerability to side-channel attacks. We establish side-channel leakage models based on the non-interference property. Then we define how the security aspects of a cache architecture can be modeled as a finite-state machine (FSM) with state transitions that cause interference. We use mutual information to quantitatively reveal potential side-channel leakage of the architectures, and allow comparison of these architectures for their relative vulnerabilities to side-channel attacks. We use real attacks to validate our results.
侧信道攻击试图破坏机密性并通过侧信道检索关键秘密。高速缓存存储器是通过侧信道攻击泄露信息的潜在来源,其中许多已被提出。同时,也提出了不同的缓存架构来防御这些攻击。然而,目前还没有办法比较和评估针对这些攻击的不同防御解决方案的有效性。在本文中,我们提出了一种新的方法来评估系统对侧信道攻击的脆弱性。基于非干涉特性,建立了侧通道泄漏模型。然后,我们定义如何将缓存架构的安全方面建模为具有导致干扰的状态转换的有限状态机(FSM)。我们使用互信息来定量地揭示架构的潜在侧信道泄漏,并允许比较这些架构对侧信道攻击的相对脆弱性。我们使用真实的攻击来验证我们的结果。
{"title":"New models of cache architectures characterizing information leakage from cache side channels","authors":"Tianwei Zhang, R. Lee","doi":"10.1145/2664243.2664273","DOIUrl":"https://doi.org/10.1145/2664243.2664273","url":null,"abstract":"Side-channel attacks try to breach confidentiality and retrieve critical secrets through the side channels. Cache memories are a potential source of information leakage through side-channel attacks, many of which have been proposed. Meanwhile, different cache architectures have also been proposed to defend against these attacks. However, there are currently no means for comparing and evaluating the effectiveness of different defense solutions against these attacks. In this paper, we propose a novel method to evaluate a system's vulnerability to side-channel attacks. We establish side-channel leakage models based on the non-interference property. Then we define how the security aspects of a cache architecture can be modeled as a finite-state machine (FSM) with state transitions that cause interference. We use mutual information to quantitatively reveal potential side-channel leakage of the architectures, and allow comparison of these architectures for their relative vulnerabilities to side-channel attacks. We use real attacks to validate our results.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices CPS:超越可用性:应用基于值敏感设计的方法来研究植入式心脏装置的域特征
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664289
Tamara Denning, D. Kramer, Batya Friedman, M. Reynolds, Brian T. Gill, Tadayoshi Kohno
Wireless implantable medical devices (IMDs) are cyber-physical systems that deliver life-saving treatments to cardiac patients with dangerous heart conditions. Current access control models for these systems are insufficient; more security is necessary. In response to this problem, the technical security community has investigated new directions for improving security on these resource-constrained devices. Defenses, however, must not only be technically secure; in order to be deployable, defenses must be designed to work within the needs and constraints of their relevant application spaces. Designing for an application space---particularly a specialized one---requires a deep understanding of the stakeholders, their values, and the contexts of technology usage. Grounding our work in value sensitive design (VSD), we collaborated as an interdisciplinary team to conduct three workshops with medical providers for the purpose of gathering their values and perspectives. The structure of our workshop builds on known workshop structures within the human-computer interaction (HCI) community, and the number of participants in our workshops (N=24) is compatible with current practices for inductive, exploratory studies. We present results on: what the participants find important with respect to providing care and performing their jobs; their reactions to potential security system concepts; and their views on what security system properties should be sought or avoided due to side effects within the context of their work practice. We synthesize these results, use the results to articulate design considerations for future technical security systems, and suggest directions for further research. Our research not only provides a contribution to security research for an important class of cyber-physical systems (IMDs); it also provides an example of leveraging techniques from other communities to better explore the landscape of security designs for technologies.
无线植入式医疗设备(imd)是一种网络物理系统,可以为患有危险心脏病的心脏病患者提供挽救生命的治疗。目前这些系统的访问控制模型是不够的;更多的安全措施是必要的。针对这个问题,技术安全社区已经研究了提高这些资源受限设备安全性的新方向。然而,防御不仅必须在技术上是安全的;为了便于部署,必须将防御设计为在其相关应用程序空间的需求和约束范围内工作。为应用程序空间进行设计——尤其是专门的应用程序空间——需要深入了解涉众、它们的价值和技术使用的上下文。我们的工作以价值敏感设计(VSD)为基础,作为一个跨学科团队,我们与医疗服务提供者合作举办了三次讲习班,目的是收集他们的价值观和观点。我们工作坊的结构建立在人机交互(HCI)社区中已知的工作坊结构之上,我们工作坊的参与者人数(N=24)与当前归纳性、探索性研究的实践相兼容。我们提供的结果是:参与者认为在提供护理和履行工作方面重要的是什么;他们对潜在安全系统概念的反应;在他们的工作实践中,由于副作用,他们应该寻求或避免哪些安全系统属性。我们综合这些结果,利用这些结果阐明未来技术安全系统的设计考虑,并提出进一步研究的方向。我们的研究不仅为一类重要的网络物理系统(imd)的安全研究提供了贡献;它还提供了一个利用其他社区的技术来更好地探索技术安全设计的示例。
{"title":"CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices","authors":"Tamara Denning, D. Kramer, Batya Friedman, M. Reynolds, Brian T. Gill, Tadayoshi Kohno","doi":"10.1145/2664243.2664289","DOIUrl":"https://doi.org/10.1145/2664243.2664289","url":null,"abstract":"Wireless implantable medical devices (IMDs) are cyber-physical systems that deliver life-saving treatments to cardiac patients with dangerous heart conditions. Current access control models for these systems are insufficient; more security is necessary. In response to this problem, the technical security community has investigated new directions for improving security on these resource-constrained devices. Defenses, however, must not only be technically secure; in order to be deployable, defenses must be designed to work within the needs and constraints of their relevant application spaces. Designing for an application space---particularly a specialized one---requires a deep understanding of the stakeholders, their values, and the contexts of technology usage. Grounding our work in value sensitive design (VSD), we collaborated as an interdisciplinary team to conduct three workshops with medical providers for the purpose of gathering their values and perspectives. The structure of our workshop builds on known workshop structures within the human-computer interaction (HCI) community, and the number of participants in our workshops (N=24) is compatible with current practices for inductive, exploratory studies. We present results on: what the participants find important with respect to providing care and performing their jobs; their reactions to potential security system concepts; and their views on what security system properties should be sought or avoided due to side effects within the context of their work practice. We synthesize these results, use the results to articulate design considerations for future technical security systems, and suggest directions for further research. Our research not only provides a contribution to security research for an important class of cyber-physical systems (IMDs); it also provides an example of leveraging techniques from other communities to better explore the landscape of security designs for technologies.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117070016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Relation extraction for inferring access control rules from natural language artifacts 从自然语言构件中推断访问控制规则的关系提取
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664280
John Slankas, Xusheng Xiao, L. Williams, Tao Xie
With over forty years of use and refinement, access control, often in the form of access control rules (ACRs), continues to be a significant control mechanism for information security. However, ACRs are typically either buried within existing natural language (NL) artifacts or elicited from subject matter experts. To address the first situation, our research goal is to aid developers who implement ACRs by inferring ACRs from NL artifacts. To aid in rule inference, we propose an approach that extracts relations (i.e., the relationship among two or more items) from NL artifacts such as requirements documents. Unlike existing approaches, our approach combines techniques from information extraction and machine learning. We develop an iterative algorithm to discover patterns that represent ACRs in sentences. We seed this algorithm with frequently occurring nouns matching a subject--action--resource pattern throughout a document. The algorithm then searches for additional combinations of those nouns to discover additional patterns. We evaluate our approach on documents from three systems in three domains: conference management, education, and healthcare. Our evaluation results show that ACRs exist in 47% of the sentences, and our approach effectively identifies those ACR sentences with a precision of 81% and recall of 65%; our approach extracts ACRs from those identified ACR sentences with an average precision of 76% and an average recall of 49%.
经过四十多年的使用和改进,访问控制(通常以访问控制规则(acr)的形式)仍然是信息安全的重要控制机制。然而,acr通常要么隐藏在现有的自然语言(NL)工件中,要么从主题专家那里获得。为了解决第一种情况,我们的研究目标是通过从NL工件推断acr来帮助实现acr的开发人员。为了帮助进行规则推理,我们提出了一种从NL工件(如需求文档)中提取关系(即两个或多个项目之间的关系)的方法。与现有的方法不同,我们的方法结合了信息提取和机器学习的技术。我们开发了一种迭代算法来发现句子中代表acr的模式。我们在整个文档中使用与主题-动作-资源模式匹配的频繁出现的名词为该算法提供种子。然后,该算法搜索这些名词的其他组合,以发现其他模式。我们从三个领域的三个系统评估我们的方法:会议管理、教育和医疗保健。我们的评估结果表明,47%的句子中存在ACR,我们的方法有效地识别了这些ACR句子,准确率为81%,召回率为65%;我们的方法从识别出的ACR句子中提取ACR,平均准确率为76%,平均召回率为49%。
{"title":"Relation extraction for inferring access control rules from natural language artifacts","authors":"John Slankas, Xusheng Xiao, L. Williams, Tao Xie","doi":"10.1145/2664243.2664280","DOIUrl":"https://doi.org/10.1145/2664243.2664280","url":null,"abstract":"With over forty years of use and refinement, access control, often in the form of access control rules (ACRs), continues to be a significant control mechanism for information security. However, ACRs are typically either buried within existing natural language (NL) artifacts or elicited from subject matter experts. To address the first situation, our research goal is to aid developers who implement ACRs by inferring ACRs from NL artifacts. To aid in rule inference, we propose an approach that extracts relations (i.e., the relationship among two or more items) from NL artifacts such as requirements documents. Unlike existing approaches, our approach combines techniques from information extraction and machine learning. We develop an iterative algorithm to discover patterns that represent ACRs in sentences. We seed this algorithm with frequently occurring nouns matching a subject--action--resource pattern throughout a document. The algorithm then searches for additional combinations of those nouns to discover additional patterns. We evaluate our approach on documents from three systems in three domains: conference management, education, and healthcare. Our evaluation results show that ACRs exist in 47% of the sentences, and our approach effectively identifies those ACR sentences with a precision of 81% and recall of 65%; our approach extracts ACRs from those identified ACR sentences with an average precision of 76% and an average recall of 49%.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
期刊
Proceedings of the 30th Annual Computer Security Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1