首页 > 最新文献

Proceedings of the 30th Annual Computer Security Applications Conference最新文献

英文 中文
Centrality metrics of importance in access behaviors and malware detections 访问行为和恶意软件检测中重要的中心性度量
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664286
Weixuan Mao, Zhongmin Cai, X. Guan, D. Towsley
System objects play different roles in a computer system and exhibit different degrees of importance with respect to system security. Identifying importance metrics can help us to develop more effective and efficient security protection methods. However, there is little previous work on evaluating the importance of objects from the perspective of security. In this paper, we propose a novel approach to evaluate the importance of various system objects based on a bipartite dependency network representation of access behaviors observed in a computer system. We introduce centrality metrics from network science to quantitatively measure the relative importance of system objects and reveal their inherent connections to security properties such as integrity and confidentiality. Furthermore, we propose importance-metric based models to characterize process behaviors and identify abnormal access patterns with respect to confidentiality and integrity. Extensive experimental results on one real-world dataset demonstrate that our model is capable of detecting 7,257 malware samples from 27,840 benign processes at 93.94% TPR under 0.1% FPR. Moreover, a selective protection scheme based on a partial behavioral model of important objects achieves comparable or even better results in malware detection when compared with complete behavior models. This demonstrates the feasibility of the devised importance metrics and presents a promising new approach to malware detection.
系统对象在计算机系统中扮演着不同的角色,对系统安全具有不同的重要性。确定重要性指标可以帮助我们开发更有效和高效的安全保护方法。然而,从安全的角度来评估物体的重要性,前人的研究很少。在本文中,我们提出了一种基于计算机系统中观察到的访问行为的二部依赖网络表示来评估各种系统对象重要性的新方法。我们从网络科学中引入中心性度量来定量测量系统对象的相对重要性,并揭示它们与安全属性(如完整性和机密性)的内在联系。此外,我们提出了基于重要度量的模型来表征过程行为并识别与机密性和完整性相关的异常访问模式。在一个真实数据集上的大量实验结果表明,我们的模型能够在0.1%的FPR下以93.94%的TPR检测到27840个良性进程中的7257个恶意软件样本。此外,基于重要对象的部分行为模型的选择性保护方案与完整的行为模型相比,在恶意软件检测方面取得了相当甚至更好的结果。这证明了所设计的重要性度量的可行性,并提出了一种有前途的恶意软件检测新方法。
{"title":"Centrality metrics of importance in access behaviors and malware detections","authors":"Weixuan Mao, Zhongmin Cai, X. Guan, D. Towsley","doi":"10.1145/2664243.2664286","DOIUrl":"https://doi.org/10.1145/2664243.2664286","url":null,"abstract":"System objects play different roles in a computer system and exhibit different degrees of importance with respect to system security. Identifying importance metrics can help us to develop more effective and efficient security protection methods. However, there is little previous work on evaluating the importance of objects from the perspective of security. In this paper, we propose a novel approach to evaluate the importance of various system objects based on a bipartite dependency network representation of access behaviors observed in a computer system. We introduce centrality metrics from network science to quantitatively measure the relative importance of system objects and reveal their inherent connections to security properties such as integrity and confidentiality. Furthermore, we propose importance-metric based models to characterize process behaviors and identify abnormal access patterns with respect to confidentiality and integrity. Extensive experimental results on one real-world dataset demonstrate that our model is capable of detecting 7,257 malware samples from 27,840 benign processes at 93.94% TPR under 0.1% FPR. Moreover, a selective protection scheme based on a partial behavioral model of important objects achieves comparable or even better results in malware detection when compared with complete behavior models. This demonstrates the feasibility of the devised importance metrics and presents a promising new approach to malware detection.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130009802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Through the eye of the PLC: semantic security monitoring for industrial processes 通过PLC之眼:对工业过程进行语义安全监控
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664277
Dina Hadziosmanovic, Robin Sommer, E. Zambon, P. Hartel
Off-the-shelf intrusion detection systems prove an ill fit for protecting industrial control systems, as they do not take their process semantics into account. Specifically, current systems fail to detect recent process control attacks that manifest as unauthorized changes to the configuration of a plant's programmable logic controllers (PLCs). In this work we present a detector that continuously tracks updates to corresponding process variables to then derive variable-specific prediction models as the basis for assessing future activity. Taking a specification-agnostic approach, we passively monitor plant activity by extracting variable updates from the devices' network communication. We evaluate the capabilities of our detection approach with traffic recorded at two operational water treatment plants serving a total of about one million people in two urban areas. We show that the proposed approach can detect direct attacks on process control, and we further explore its potential to identify more sophisticated indirect attacks on field device measurements as well.
事实证明,现成的入侵检测系统不适合保护工业控制系统,因为它们没有考虑到过程语义。具体来说,当前的系统无法检测到最近的过程控制攻击,这些攻击表现为对工厂可编程逻辑控制器(plc)配置的未经授权的更改。在这项工作中,我们提出了一种检测器,它可以连续跟踪相应过程变量的更新,然后得出变量特定的预测模型,作为评估未来活动的基础。采用与规格无关的方法,我们通过从设备的网络通信中提取变量更新来被动地监控工厂活动。我们通过两个运作中的水处理厂的流量记录来评估我们的检测方法的能力,这两个水处理厂在两个市区共服务约100万人。我们表明,所提出的方法可以检测对过程控制的直接攻击,并且我们进一步探索其识别对现场设备测量的更复杂的间接攻击的潜力。
{"title":"Through the eye of the PLC: semantic security monitoring for industrial processes","authors":"Dina Hadziosmanovic, Robin Sommer, E. Zambon, P. Hartel","doi":"10.1145/2664243.2664277","DOIUrl":"https://doi.org/10.1145/2664243.2664277","url":null,"abstract":"Off-the-shelf intrusion detection systems prove an ill fit for protecting industrial control systems, as they do not take their process semantics into account. Specifically, current systems fail to detect recent process control attacks that manifest as unauthorized changes to the configuration of a plant's programmable logic controllers (PLCs). In this work we present a detector that continuously tracks updates to corresponding process variables to then derive variable-specific prediction models as the basis for assessing future activity. Taking a specification-agnostic approach, we passively monitor plant activity by extracting variable updates from the devices' network communication. We evaluate the capabilities of our detection approach with traffic recorded at two operational water treatment plants serving a total of about one million people in two urban areas. We show that the proposed approach can detect direct attacks on process control, and we further explore its potential to identify more sophisticated indirect attacks on field device measurements as well.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 178
Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications 将双重因素提升到一个新的水平:保护在线扑克,银行,医疗保健和其他应用程序
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2684461
A. Rubin
As an avid poker player, I enjoyed playing low stakes cash games and low buy-in tournaments on Full Tilt Poker before Black Friday.i However, as a Computer Scientist specializing in network and software security, I would never play poker online for any significant stakes, due to security concerns around malware and malicious remote access tools. Similarly, malware and remote access tools threaten online banking, online access to healthcare records and many other applications. In this article, I describe a new solution to the problem of remote access via malware that is easy to adopt, requires no new hardware or user training, and which I believe greatly reduces the threats to online applications.
作为一名狂热的扑克玩家,我喜欢在黑色星期五之前在全速扑克上玩低赌注现金游戏和低购买锦标赛。然而,作为一名专门研究网络和软件安全的计算机科学家,由于对恶意软件和恶意远程访问工具的安全考虑,我绝不会在网上玩扑克。同样,恶意软件和远程访问工具也威胁着网上银行、在线访问医疗记录和许多其他应用程序。在本文中,我描述了一种针对恶意软件远程访问问题的新解决方案,该解决方案易于采用,不需要新的硬件或用户培训,并且我相信它大大降低了对在线应用程序的威胁。
{"title":"Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications","authors":"A. Rubin","doi":"10.1145/2664243.2684461","DOIUrl":"https://doi.org/10.1145/2664243.2684461","url":null,"abstract":"As an avid poker player, I enjoyed playing low stakes cash games and low buy-in tournaments on Full Tilt Poker before Black Friday.i However, as a Computer Scientist specializing in network and software security, I would never play poker online for any significant stakes, due to security concerns around malware and malicious remote access tools. Similarly, malware and remote access tools threaten online banking, online access to healthcare records and many other applications. In this article, I describe a new solution to the problem of remote access via malware that is easy to adopt, requires no new hardware or user training, and which I believe greatly reduces the threats to online applications.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TrueClick: automatically distinguishing trick banners from genuine download links TrueClick:自动区分欺骗横幅从真正的下载链接
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664279
Sevtap Duman, Kaan Onarlioglu, Ali O. Ulusoy, William K. Robertson, E. Kirda
The ubiquity of Internet advertising has made it a popular target for attackers. One well-known instance of these attacks is the widespread use of trick banners that use social engineering techniques to lure victims into clicking on deceptive fake links, potentially leading to a malicious domain or malware. A recent and pervasive trend by attackers is to imitate the "download" or "play" buttons in popular file sharing sites (e.g., one-click hosters, video-streaming sites, bittorrent sites) in an attempt to trick users into clicking on these fake banners instead of the genuine link. In this paper, we explore the problem of automatically assisting Internet users in detecting malicious trick banners and helping them identify the correct link. We present a set of features to characterize trick banners based on their visual properties such as image size, color, placement on the enclosing webpage, whether they contain animation effects, and whether they consistently appear with the same visual properties on consecutive loads of the same webpage. We have implemented a tool called TrueClick, which uses image processing and machine learning techniques to build a classifier based on these features to automatically detect the trick banners on a webpage. Our approach automatically classifies trick banners, and requires no manual effort to compile blacklists as current approaches do. Our experiments show that TrueClick results in a 3.55 factor improvement in correct link selection in the absence of other ad blocking software, and that it can detect trick banners missed by a popular ad detection tool, Adblock Plus.
无处不在的互联网广告使其成为攻击者的热门目标。这些攻击的一个众所周知的例子是广泛使用欺骗横幅,使用社会工程技术引诱受害者点击欺骗性虚假链接,可能导致恶意域名或恶意软件。攻击者最近的一个普遍趋势是模仿流行的文件共享网站(例如,一键式主机,视频流网站,bt网站)中的“下载”或“播放”按钮,试图欺骗用户点击这些虚假的横幅而不是真正的链接。在本文中,我们探讨了自动协助互联网用户检测恶意欺骗横幅并帮助他们识别正确链接的问题。我们提出了一组基于其视觉属性的特征,如图像大小,颜色,在包围网页上的位置,是否包含动画效果,以及它们是否始终以相同的视觉属性出现在同一网页的连续加载上。我们已经实现了一个名为TrueClick的工具,它使用图像处理和机器学习技术来构建基于这些特征的分类器,以自动检测网页上的欺骗横幅。我们的方法会自动对欺骗广告条进行分类,不需要像目前的方法那样手动编制黑名单。我们的实验表明,在没有其他广告拦截软件的情况下,TrueClick在正确链接选择方面的效果提高了3.55倍,而且它可以检测到流行的广告检测工具Adblock Plus遗漏的欺骗性横幅。
{"title":"TrueClick: automatically distinguishing trick banners from genuine download links","authors":"Sevtap Duman, Kaan Onarlioglu, Ali O. Ulusoy, William K. Robertson, E. Kirda","doi":"10.1145/2664243.2664279","DOIUrl":"https://doi.org/10.1145/2664243.2664279","url":null,"abstract":"The ubiquity of Internet advertising has made it a popular target for attackers. One well-known instance of these attacks is the widespread use of trick banners that use social engineering techniques to lure victims into clicking on deceptive fake links, potentially leading to a malicious domain or malware. A recent and pervasive trend by attackers is to imitate the \"download\" or \"play\" buttons in popular file sharing sites (e.g., one-click hosters, video-streaming sites, bittorrent sites) in an attempt to trick users into clicking on these fake banners instead of the genuine link. In this paper, we explore the problem of automatically assisting Internet users in detecting malicious trick banners and helping them identify the correct link. We present a set of features to characterize trick banners based on their visual properties such as image size, color, placement on the enclosing webpage, whether they contain animation effects, and whether they consistently appear with the same visual properties on consecutive loads of the same webpage. We have implemented a tool called TrueClick, which uses image processing and machine learning techniques to build a classifier based on these features to automatically detect the trick banners on a webpage. Our approach automatically classifies trick banners, and requires no manual effort to compile blacklists as current approaches do. Our experiments show that TrueClick results in a 3.55 factor improvement in correct link selection in the absence of other ad blocking software, and that it can detect trick banners missed by a popular ad detection tool, Adblock Plus.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
OSPF vulnerability to persistent poisoning attacks: a systematic analysis OSPF持续中毒攻击的脆弱性系统分析
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664278
Gabi Nakibly, Adi Sosnovich, E. Menahem, Ariel Waizel, Y. Elovici
Open Shortest Path First (OSPF) is one of the most widely deployed interior gateway routing protocols on the Internet. The most common attack vector against OSPF is spoofing of routing advertisements on behalf of a remote router. OSPF employs a self-defense "fight-back" mechanism that quickly reverts the effects of such attacks. Nonetheless, some attacks that evade the fight-back mechanism have been discovered, making it possible to persistently falsify routing advertisements. This type of attacks are the most serious threat to a routing protocol since they allow an attacker to gain persistent control over how traffic is routed throughout the network. This shows that despite its maturity, the OSPF specification is not without security flaws and may have still-unknown vulnerabilities. In this work we systematically analyze -- manually and by formal verification -- the OSPF specification for additional vulnerabilities in the fight-back mechanism. Our analysis uncovered a fundamental security flaw in OSPF that allows a simple means for an attacker to evade the fight-back mechanism. Most major router vendors acknowledged the existence of this vulnerability in their products. Fortunately, our analysis strongly indicates that no other vulnerabilities in the fight-back mechanism are likely to exist.
开放最短路径优先(OSPF)是Internet上部署最广泛的内部网关路由协议之一。针对OSPF最常见的攻击媒介是代表远程路由器欺骗路由通告。OSPF采用了一种自我防卫的“反击”机制,可以快速地恢复这种攻击的影响。尽管如此,已经发现了一些逃避反击机制的攻击,使得持续伪造路由广告成为可能。这种类型的攻击是对路由协议最严重的威胁,因为它们允许攻击者获得对流量在整个网络中的路由方式的持久控制。这说明尽管OSPF规范已经成熟,但它也存在安全缺陷,可能存在未知的漏洞。在这项工作中,我们系统地分析——手动和通过正式验证——OSPF规范中反击机制中的其他漏洞。我们的分析揭示了OSPF的一个基本安全漏洞,它允许攻击者以一种简单的方式逃避反击机制。大多数主要的路由器供应商都承认他们的产品中存在这个漏洞。幸运的是,我们的分析有力地表明,反击机制中不可能存在其他漏洞。
{"title":"OSPF vulnerability to persistent poisoning attacks: a systematic analysis","authors":"Gabi Nakibly, Adi Sosnovich, E. Menahem, Ariel Waizel, Y. Elovici","doi":"10.1145/2664243.2664278","DOIUrl":"https://doi.org/10.1145/2664243.2664278","url":null,"abstract":"Open Shortest Path First (OSPF) is one of the most widely deployed interior gateway routing protocols on the Internet. The most common attack vector against OSPF is spoofing of routing advertisements on behalf of a remote router. OSPF employs a self-defense \"fight-back\" mechanism that quickly reverts the effects of such attacks. Nonetheless, some attacks that evade the fight-back mechanism have been discovered, making it possible to persistently falsify routing advertisements. This type of attacks are the most serious threat to a routing protocol since they allow an attacker to gain persistent control over how traffic is routed throughout the network. This shows that despite its maturity, the OSPF specification is not without security flaws and may have still-unknown vulnerabilities. In this work we systematically analyze -- manually and by formal verification -- the OSPF specification for additional vulnerabilities in the fight-back mechanism. Our analysis uncovered a fundamental security flaw in OSPF that allows a simple means for an attacker to evade the fight-back mechanism. Most major router vendors acknowledged the existence of this vulnerability in their products. Fortunately, our analysis strongly indicates that no other vulnerabilities in the fight-back mechanism are likely to exist.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124133102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
SEER: practical memory virus scanning as a service 实用内存病毒扫描即服务
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664271
Jason Gionta, Ahmed M. Azab, W. Enck, P. Ning, Xiaolan Zhang
Virus Scanning-as-a-Service (VSaaS) has emerged as a popular security solution for virtual cloud environments. However, existing approaches fail to scan guest memory, which can contain an emerging class of Memory-only Malware. While several host-based memory scanners are available, they are computationally less practical for cloud environments. This paper proposes SEER as an architecture for enabling Memory VSaaS for virtualized environments. SEER leverages cloud resources and technologies to consolidate and aggregate virus scanning activities to efficiently detect malware residing in memory. Specifically, SEER combines fast memory snapshotting and computation deduplication to provide practical and efficient off-host memory virus scanning. We evaluate SEER and demonstrate up to an 87% reduction in data size that must be scanned and up to 72% savings in overall scan time, compared to naively applying file-based scanning approaches. Furthermore, SEER provides a 50% reduction in scan time when using a warm cache. In doing so, SEER provides a practical solution for cloud vendors to transparently and periodically scan virtual machine memory for malware.
病毒扫描即服务(VSaaS)已成为虚拟云环境中流行的安全解决方案。然而,现有的方法无法扫描客户内存,这可能包含一类新兴的仅内存恶意软件。虽然有几种基于主机的内存扫描仪可用,但它们在计算上不太适合云环境。本文提出将SEER作为在虚拟化环境中启用内存VSaaS的体系结构。SEER利用云资源和技术来整合和聚合病毒扫描活动,以有效地检测驻留在内存中的恶意软件。具体而言,SEER结合了快速内存快照和重复数据删除计算,以提供实用和高效的非主机内存病毒扫描。我们对SEER进行了评估,并证明与单纯应用基于文件的扫描方法相比,SEER可将必须扫描的数据大小减少87%,总扫描时间节省72%。此外,当使用热缓存时,SEER提供了50%的扫描时间减少。在此过程中,SEER为云供应商提供了一个实用的解决方案,可以透明地定期扫描虚拟机内存中的恶意软件。
{"title":"SEER: practical memory virus scanning as a service","authors":"Jason Gionta, Ahmed M. Azab, W. Enck, P. Ning, Xiaolan Zhang","doi":"10.1145/2664243.2664271","DOIUrl":"https://doi.org/10.1145/2664243.2664271","url":null,"abstract":"Virus Scanning-as-a-Service (VSaaS) has emerged as a popular security solution for virtual cloud environments. However, existing approaches fail to scan guest memory, which can contain an emerging class of Memory-only Malware. While several host-based memory scanners are available, they are computationally less practical for cloud environments. This paper proposes SEER as an architecture for enabling Memory VSaaS for virtualized environments. SEER leverages cloud resources and technologies to consolidate and aggregate virus scanning activities to efficiently detect malware residing in memory. Specifically, SEER combines fast memory snapshotting and computation deduplication to provide practical and efficient off-host memory virus scanning. We evaluate SEER and demonstrate up to an 87% reduction in data size that must be scanned and up to 72% savings in overall scan time, compared to naively applying file-based scanning approaches. Furthermore, SEER provides a 50% reduction in scan time when using a warm cache. In doing so, SEER provides a practical solution for cloud vendors to transparently and periodically scan virtual machine memory for malware.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hot-hardening: getting more out of your security settings 热加固:从安全设置中获得更多
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664246
Sebastian Biedermann, S. Katzenbeisser, Jakub Szefer
Applying optimized security settings to applications is a difficult and laborious task. Especially in cloud computing, where virtual servers with various pre-installed software packages are leased, selecting optimized security settings is very difficult. In particular, optimized security settings are not identical in every setup. They depend on characteristics of the setup, on the ways an application is used or on other applications running on the same system. Configuring optimized settings given these interdependencies is a complex and time-consuming task. In this work, we present an autonomous agent which improves security settings of applications which run in virtual servers. The agent retrieves custom-made security settings for a target application by investigating its specific setup, it tests and transparently changes settings via introspection techniques unbeknownst from the perspective of the virtual server. During setting selection, the application's operation is not disturbed nor any user interaction is needed. Since optimal settings can change over time or they can change depending on different tasks the application handles, the agent can continuously adapt settings as well as improve them periodically. We call this approach hot-hardening and present results of an implementation that can hot-harden popular networking applications such as Apache2 and OpenSSH.
将优化的安全设置应用到应用程序是一项困难而费力的任务。特别是在租用带有各种预安装软件包的虚拟服务器的云计算中,选择优化的安全设置非常困难。特别是,优化的安全设置在每个设置中都不相同。它们取决于设置的特征、使用应用程序的方式或在同一系统上运行的其他应用程序。根据这些相互依赖关系配置优化设置是一项复杂且耗时的任务。在这项工作中,我们提出了一个自治代理,它提高了在虚拟服务器中运行的应用程序的安全设置。代理通过调查目标应用程序的特定设置来检索定制的安全设置,它通过虚拟服务器不知道的内省技术测试并透明地更改设置。在设置选择期间,应用程序的操作不受干扰,也不需要任何用户交互。由于最佳设置可以随时间变化,或者可以根据应用程序处理的不同任务而变化,因此代理可以不断地调整设置并定期改进设置。我们称这种方法为热加固,并给出了一种可以热加固流行网络应用程序(如Apache2和OpenSSH)的实现结果。
{"title":"Hot-hardening: getting more out of your security settings","authors":"Sebastian Biedermann, S. Katzenbeisser, Jakub Szefer","doi":"10.1145/2664243.2664246","DOIUrl":"https://doi.org/10.1145/2664243.2664246","url":null,"abstract":"Applying optimized security settings to applications is a difficult and laborious task. Especially in cloud computing, where virtual servers with various pre-installed software packages are leased, selecting optimized security settings is very difficult. In particular, optimized security settings are not identical in every setup. They depend on characteristics of the setup, on the ways an application is used or on other applications running on the same system. Configuring optimized settings given these interdependencies is a complex and time-consuming task. In this work, we present an autonomous agent which improves security settings of applications which run in virtual servers. The agent retrieves custom-made security settings for a target application by investigating its specific setup, it tests and transparently changes settings via introspection techniques unbeknownst from the perspective of the virtual server. During setting selection, the application's operation is not disturbed nor any user interaction is needed. Since optimal settings can change over time or they can change depending on different tasks the application handles, the agent can continuously adapt settings as well as improve them periodically. We call this approach hot-hardening and present results of an implementation that can hot-harden popular networking applications such as Apache2 and OpenSSH.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127910891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ICE: a passive, high-speed, state-continuity scheme ICE:一种被动的、高速的、状态连续性的方案
Pub Date : 2014-09-01 DOI: 10.1145/2664243.2664259
Raoul Strackx, B. Jacobs, F. Piessens
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood of vulnerabilities in their huge software stacks. Protected-module architectures, such as Intel SGX, provide an interesting alternative by isolating the execution of software modules. To minimize the amount of code that provides support for the protected-module architecture, persistent storage of (confidentiality and integrity protected) states of modules can be delegated to the untrusted operating system. But precautions should be taken to ensure state continuity: an attacker should not be able to cause a module to use stale states (a so-called rollback attack), and while the system is not under attack, a module should always be able to make progress, even when the system could crash or lose power at unexpected, random points in time (i.e., the system should be crash resilient). Providing state-continuity support is non-trivial as many algorithms are vulnerable to attack, require on-chip non-volatile memory, wear-out existing off-chip secure non-volatile memory and/or are too slow for many applications. We present ICE, a system and algorithm providing state-continuity guarantees to protected modules. ICE's novelty lies in the facts that (1) it does not rely on secure non-volatile storage for every state update (e.g., the slow TPM chip). (2) ICE is a passive security measure. An attacker interrupting the main power supply or any other source of power, cannot break state-continuity. (3) Benchmarks show that ICE already enables state-continuous updates almost 5x faster than writing to TPM NVRAM. With dedicated hardware, performance can be increased 2 orders of magnitude. ICE's security properties are guaranteed by means of a machine-checked proof and a prototype implementation is evaluated on commodity hardware.
对商品计算平台的信任程度受到其庞大软件堆栈中存在漏洞的可能性的限制。受保护的模块体系结构,如Intel SGX,通过隔离软件模块的执行提供了一个有趣的替代方案。为了尽量减少支持受保护模块体系结构的代码量,可以将模块状态(受机密性和完整性保护)的持久存储委托给不受信任的操作系统。但是应该采取预防措施来确保状态连续性:攻击者不应该使模块使用陈旧的状态(所谓的回滚攻击),当系统没有受到攻击时,模块应该始终能够取得进展,即使系统可能在意外的随机时间点崩溃或断电(即,系统应该具有崩溃弹性)。提供状态连续性支持是非常重要的,因为许多算法容易受到攻击,需要片上非易失性存储器,磨损现有的片外安全非易失性存储器,或者对于许多应用程序来说速度太慢。我们提出了一种为被保护模块提供状态连续性保证的系统和算法ICE。ICE的新奇之处在于:(1)它不依赖于安全的非易失性存储来进行每次状态更新(例如,慢速的TPM芯片)。(2) ICE是一种被动安全措施。攻击者中断主电源或任何其他电源,不能破坏状态连续性。(3)基准测试表明,ICE已经使状态持续更新比写入TPM NVRAM快近5倍。使用专用硬件,性能可以提高2个数量级。ICE的安全特性通过机器检查的证明来保证,并在商用硬件上评估原型实现。
{"title":"ICE: a passive, high-speed, state-continuity scheme","authors":"Raoul Strackx, B. Jacobs, F. Piessens","doi":"10.1145/2664243.2664259","DOIUrl":"https://doi.org/10.1145/2664243.2664259","url":null,"abstract":"The amount of trust that can be placed in commodity computing platforms is limited by the likelihood of vulnerabilities in their huge software stacks. Protected-module architectures, such as Intel SGX, provide an interesting alternative by isolating the execution of software modules. To minimize the amount of code that provides support for the protected-module architecture, persistent storage of (confidentiality and integrity protected) states of modules can be delegated to the untrusted operating system. But precautions should be taken to ensure state continuity: an attacker should not be able to cause a module to use stale states (a so-called rollback attack), and while the system is not under attack, a module should always be able to make progress, even when the system could crash or lose power at unexpected, random points in time (i.e., the system should be crash resilient). Providing state-continuity support is non-trivial as many algorithms are vulnerable to attack, require on-chip non-volatile memory, wear-out existing off-chip secure non-volatile memory and/or are too slow for many applications. We present ICE, a system and algorithm providing state-continuity guarantees to protected modules. ICE's novelty lies in the facts that (1) it does not rely on secure non-volatile storage for every state update (e.g., the slow TPM chip). (2) ICE is a passive security measure. An attacker interrupting the main power supply or any other source of power, cannot break state-continuity. (3) Benchmarks show that ICE already enables state-continuous updates almost 5x faster than writing to TPM NVRAM. With dedicated hardware, performance can be increased 2 orders of magnitude. ICE's security properties are guaranteed by means of a machine-checked proof and a prototype implementation is evaluated on commodity hardware.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"45 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124433156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Proceedings of the 30th Annual Computer Security Applications Conference 第30届计算机安全应用年会论文集
{"title":"Proceedings of the 30th Annual Computer Security Applications Conference","authors":"","doi":"10.1145/2664243","DOIUrl":"https://doi.org/10.1145/2664243","url":null,"abstract":"","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 30th Annual Computer Security Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1