首页 > 最新文献

Proceedings of the 2021 on Cloud Computing Security Workshop最新文献

英文 中文
Guardian: Symbolic Validation of Orderliness in SGX Enclaves 守护者:新交所飞地秩序的象征性验证
Pub Date : 2021-05-12 DOI: 10.1145/3474123.3486755
P. Antonino, Wojciech Aleksander Wołoszyn, A. W. Roscoe
Modern processors can offer hardware primitives that allow a process to run in isolation. These primitives implement a trusted execution environment (TEE) in which a program can run such that the integrity and confidentiality of its execution are guaranteed. Intel's Software Guard eXtensions (SGX) is an example of such primitives and its isolated processes are called enclaves. These guarantees, however, can be easily thwarted if the enclave has not been properly designed. Its interface with the untrusted software stack is a perhaps the largest attack surface that adversaries can exploit; unintended interactions with untrusted code can expose the enclave to memory corruption attacks, for instance. In this paper, we propose a notion of an orderly enclave which splits its behaviour into the following execution phases: entry, secure, ocall, and exit. Each of them imposes a set of restrictions that enforce a particular policy of access to untrusted memory and, in some cases, sanitisation conditions. A violation of these policies and conditions might indicate an undesired interaction with untrusted data/code or a lack of sanitisation, both of which can be harnessed to perpetrate attacks against the enclave. We also introduce Guardian: an open-source tool that uses symbolic execution to carry out the validation of an enclave against our notion of an orderly enclave; in this process, it also looks for some other typical attack primitives. We discuss how our approach can prevent and flag enclave vulnerabilities that have been identified in the literature. Moreover, we have evaluated how our approach fares in the analysis of some enclave samples. In this process, Guardian identified some security issues previously undetected in some of these samples that were acknowledged and fixed by the corresponding maintainers.
现代处理器可以提供允许进程独立运行的硬件原语。这些原语实现了一个可信的执行环境(TEE),程序可以在其中运行,从而保证其执行的完整性和机密性。英特尔的Software Guard eXtensions (SGX)就是这样一个原语的例子,它的孤立进程被称为enclave。然而,如果这块飞地设计不当,这些保证很容易遭到破坏。它与不受信任的软件堆栈的接口可能是攻击者可以利用的最大攻击面;例如,与不受信任的代码的意外交互可能使enclave暴露于内存损坏攻击。在本文中,我们提出了一个有序飞地的概念,它将其行为划分为以下几个执行阶段:进入、安全、调用和退出。它们中的每一个都强加了一组限制,这些限制强制执行访问不可信内存的特定策略,在某些情况下,还强制执行清理条件。违反这些政策和条件可能表明与不受信任的数据/代码进行了不希望的交互,或者缺乏清理,这两种情况都可以被用来对飞地进行攻击。我们还介绍了Guardian:一个开源工具,它使用符号执行来执行对飞地的验证,而不是我们对有序飞地的概念;在这个过程中,它还寻找一些其他典型的攻击原语。我们讨论了我们的方法如何预防和标记文献中已经确定的飞地漏洞。此外,我们已经评估了我们的方法在分析一些飞地样本中的效果。在这个过程中,Guardian发现了一些以前在这些样本中未检测到的安全问题,相应的维护者承认并修复了这些问题。
{"title":"Guardian: Symbolic Validation of Orderliness in SGX Enclaves","authors":"P. Antonino, Wojciech Aleksander Wołoszyn, A. W. Roscoe","doi":"10.1145/3474123.3486755","DOIUrl":"https://doi.org/10.1145/3474123.3486755","url":null,"abstract":"Modern processors can offer hardware primitives that allow a process to run in isolation. These primitives implement a trusted execution environment (TEE) in which a program can run such that the integrity and confidentiality of its execution are guaranteed. Intel's Software Guard eXtensions (SGX) is an example of such primitives and its isolated processes are called enclaves. These guarantees, however, can be easily thwarted if the enclave has not been properly designed. Its interface with the untrusted software stack is a perhaps the largest attack surface that adversaries can exploit; unintended interactions with untrusted code can expose the enclave to memory corruption attacks, for instance. In this paper, we propose a notion of an orderly enclave which splits its behaviour into the following execution phases: entry, secure, ocall, and exit. Each of them imposes a set of restrictions that enforce a particular policy of access to untrusted memory and, in some cases, sanitisation conditions. A violation of these policies and conditions might indicate an undesired interaction with untrusted data/code or a lack of sanitisation, both of which can be harnessed to perpetrate attacks against the enclave. We also introduce Guardian: an open-source tool that uses symbolic execution to carry out the validation of an enclave against our notion of an orderly enclave; in this process, it also looks for some other typical attack primitives. We discuss how our approach can prevent and flag enclave vulnerabilities that have been identified in the literature. Moreover, we have evaluated how our approach fares in the analysis of some enclave samples. In this process, Guardian identified some security issues previously undetected in some of these samples that were acknowledged and fixed by the corresponding maintainers.","PeriodicalId":109533,"journal":{"name":"Proceedings of the 2021 on Cloud Computing Security Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment 保护隐私的随机对照试验:工业规模部署的协议
Pub Date : 2021-01-12 DOI: 10.1145/3474123.3486764
Mahnush Movahedi, Benjamin M. Case, James Honaker, Andrew Knox, Li Li, Yiming Paul Li, Sanjay Saravanan, Shubho Sengupta, Erik Taubeneck
Randomized Controlled Trials, when feasible, give the strongest and most trustworthy empirical measures of causal effects. They are the gold standard in many clinical, social, and behavioral fields of study. However, the most important settings often involve the most sensitive data, therefore cause privacy concerns. In this paper, we outline a way to deploy an end-to-end privacy-preserving protocol for learning causal effects from Randomized Controlled Trials (RCTs). We are particularly focused on the difficult and important case where one party determines which treatment an individual receives, and another party measures outcomes on individuals, and these parties do not want to leak any of their information to each other, but still want to collectively learn a true causal effect in the world. Moreover, we show how such a protocol can be scaled to 500 million rows of data and more than a billion gates. We also offer an open source deployment of this protocol. We accomplish this by a three-stage solution, interconnecting and blending three privacy technologies--private set intersection, multiparty computation, and differential privacy--to address core points of privacy leakage, at the join, at the point of computation, and at the release, respectively. The first stage uses the Private-ID protocol[8] to create a private encrypted join of the users. The second stage utilizes the encrypted join to run multiple instances of a general purpose MPC over a sharded database to aggregate statistics about each experimental group while discarding individuals who took an action before they received treatment. The third stage adds distributed and calibrated Differential Privacy (DP) noise within the final MPC computations to the released aggregate statistical estimates of causal effects and their uncertainty measures, providing formal two-sided privacy guarantees. We also evaluate the performance of multiple open source general purpose MPC libraries for this task. We additionally demonstrate how we have used this to create a working ads effectiveness measurement product capable of measuring hundreds of millions of individuals per experiment.
在可行的情况下,随机对照试验提供了最有力、最可信的因果关系实证测量。它们是许多临床、社会和行为研究领域的黄金标准。然而,最重要的设置通常涉及最敏感的数据,因此会引起隐私问题。在本文中,我们概述了一种部署端到端隐私保护协议的方法,用于从随机对照试验(rct)中学习因果效应。我们特别关注困难而重要的案例,即一方决定个体接受何种治疗,另一方衡量个体的结果,这些各方不想向彼此泄露任何信息,但仍然希望共同了解世界上真正的因果关系。此外,我们还展示了如何将这样的协议扩展到5亿行数据和超过10亿个门。我们还提供了该协议的开源部署。我们通过一个三阶段的解决方案来实现这一目标,将三种隐私技术——私有集交叉、多方计算和差分隐私——相互连接和混合,分别在连接点、计算点和发布点解决隐私泄露的核心问题。第一阶段使用private - id协议[8]创建用户的私有加密连接。第二阶段利用加密连接在分片数据库上运行通用MPC的多个实例,以聚合每个实验组的统计数据,同时丢弃在接受治疗之前采取行动的个体。第三阶段将最终MPC计算中的分布式和校准差分隐私(DP)噪声添加到已发布的因果效应及其不确定性度量的汇总统计估计中,提供正式的双边隐私保证。我们还评估了用于此任务的多个开源通用MPC库的性能。我们还演示了我们如何使用它来创建一个有效的广告效果测量产品,该产品能够在每次实验中测量数亿个人。
{"title":"Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment","authors":"Mahnush Movahedi, Benjamin M. Case, James Honaker, Andrew Knox, Li Li, Yiming Paul Li, Sanjay Saravanan, Shubho Sengupta, Erik Taubeneck","doi":"10.1145/3474123.3486764","DOIUrl":"https://doi.org/10.1145/3474123.3486764","url":null,"abstract":"Randomized Controlled Trials, when feasible, give the strongest and most trustworthy empirical measures of causal effects. They are the gold standard in many clinical, social, and behavioral fields of study. However, the most important settings often involve the most sensitive data, therefore cause privacy concerns. In this paper, we outline a way to deploy an end-to-end privacy-preserving protocol for learning causal effects from Randomized Controlled Trials (RCTs). We are particularly focused on the difficult and important case where one party determines which treatment an individual receives, and another party measures outcomes on individuals, and these parties do not want to leak any of their information to each other, but still want to collectively learn a true causal effect in the world. Moreover, we show how such a protocol can be scaled to 500 million rows of data and more than a billion gates. We also offer an open source deployment of this protocol. We accomplish this by a three-stage solution, interconnecting and blending three privacy technologies--private set intersection, multiparty computation, and differential privacy--to address core points of privacy leakage, at the join, at the point of computation, and at the release, respectively. The first stage uses the Private-ID protocol[8] to create a private encrypted join of the users. The second stage utilizes the encrypted join to run multiple instances of a general purpose MPC over a sharded database to aggregate statistics about each experimental group while discarding individuals who took an action before they received treatment. The third stage adds distributed and calibrated Differential Privacy (DP) noise within the final MPC computations to the released aggregate statistical estimates of causal effects and their uncertainty measures, providing formal two-sided privacy guarantees. We also evaluate the performance of multiple open source general purpose MPC libraries for this task. We additionally demonstrate how we have used this to create a working ads effectiveness measurement product capable of measuring hundreds of millions of individuals per experiment.","PeriodicalId":109533,"journal":{"name":"Proceedings of the 2021 on Cloud Computing Security Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Automating Seccomp Filter Generation for Linux Applications 为Linux应用程序自动生成Seccomp过滤器
Pub Date : 2020-12-04 DOI: 10.1145/3474123.3486762
Claudio Canella, M. Werner, D. Gruss, Michael Schwarz
Software vulnerabilities undermine the security of applications. By blocking unused functionality, the impact of potential exploits can be reduced. While seccomp provides a solution for filtering syscalls, it requires manual implementation of filter rules for each individual application. Recent work has investigated approaches to automate this task. However, as we show, these approaches make assumptions that are not necessary or require overly time-consuming analysis. In this paper, we propose Chestnut, an automated approach for generating strict syscall filters with lower requirements and limitations. Chestnut comprises two phases, with the first phase consisting of two static components, i.e., a compiler and a binary analyzer, that statically extract the used syscalls. The compiler-based approach of Chestnut is up to factor 73 faster than previous approaches with the same accuracy. On the binary level, our approach extends over previous ones by also applying to non-PIC binaries. An optional second phase of Chestnut is dynamic refinement to restrict the set of allowed syscalls further. We demonstrate that Chestnut on average blocks 302 syscalls (86.5%) via the compiler and 288 (82.5%) using the binary analysis on a set of 18 applications. Chestnut blocks the dangerous exec syscall in 50% and 77.7% of the tested applications using the compiler- and binary-based approach, respectively. For the tested applications, Chestnut blocks exploitation of more than 61% of the 175 CVEs that target the kernel via syscalls.
软件漏洞会破坏应用程序的安全性。通过阻止未使用的功能,可以减少潜在漏洞的影响。虽然seccomp提供了过滤系统调用的解决方案,但它需要为每个单独的应用程序手动实现过滤规则。最近的工作研究了自动化这项任务的方法。然而,正如我们所展示的,这些方法所做的假设是不必要的,或者需要过度耗时的分析。在本文中,我们提出了Chestnut,一种自动化的方法来生成严格的系统调用过滤器,具有较低的要求和限制。Chestnut包含两个阶段,第一阶段包含两个静态组件,即编译器和二进制分析器,它们静态地提取使用的系统调用。Chestnut基于编译器的方法在相同精度下比以前的方法快了73倍。在二进制级别上,我们的方法扩展了以前的方法,也适用于非pic二进制文件。Chestnut的第二个可选阶段是动态细化,以进一步限制允许的系统调用集。我们证明了Chestnut通过编译器平均阻塞302个系统调用(86.5%),在一组18个应用程序上使用二进制分析平均阻塞288个系统调用(82.5%)。Chestnut分别在50%和77.7%的测试应用程序中使用基于编译器和二进制的方法阻止了危险的exec系统调用。对于测试的应用程序,在175个通过系统调用攻击内核的cve中,Chestnut阻止了61%以上的漏洞利用。
{"title":"Automating Seccomp Filter Generation for Linux Applications","authors":"Claudio Canella, M. Werner, D. Gruss, Michael Schwarz","doi":"10.1145/3474123.3486762","DOIUrl":"https://doi.org/10.1145/3474123.3486762","url":null,"abstract":"Software vulnerabilities undermine the security of applications. By blocking unused functionality, the impact of potential exploits can be reduced. While seccomp provides a solution for filtering syscalls, it requires manual implementation of filter rules for each individual application. Recent work has investigated approaches to automate this task. However, as we show, these approaches make assumptions that are not necessary or require overly time-consuming analysis. In this paper, we propose Chestnut, an automated approach for generating strict syscall filters with lower requirements and limitations. Chestnut comprises two phases, with the first phase consisting of two static components, i.e., a compiler and a binary analyzer, that statically extract the used syscalls. The compiler-based approach of Chestnut is up to factor 73 faster than previous approaches with the same accuracy. On the binary level, our approach extends over previous ones by also applying to non-PIC binaries. An optional second phase of Chestnut is dynamic refinement to restrict the set of allowed syscalls further. We demonstrate that Chestnut on average blocks 302 syscalls (86.5%) via the compiler and 288 (82.5%) using the binary analysis on a set of 18 applications. Chestnut blocks the dangerous exec syscall in 50% and 77.7% of the tested applications using the compiler- and binary-based approach, respectively. For the tested applications, Chestnut blocks exploitation of more than 61% of the 175 CVEs that target the kernel via syscalls.","PeriodicalId":109533,"journal":{"name":"Proceedings of the 2021 on Cloud Computing Security Workshop","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124739213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Private Hierarchical Clustering and Efficient Approximation 私有层次聚类和有效逼近
Pub Date : 2019-04-09 DOI: 10.1145/3474123.3486760
Xianrui Meng, D. Papadopoulos, Alina Oprea, Nikos Triandopoulos
In collaborative learning, multiple parties contribute their datasets to jointly deduce global machine learning models for numerous predictive tasks. Despite its efficacy, this learning paradigm fails to encompass critical application domains that involve highly sensitive data, such as healthcare and security analytics, where privacy risks limit entities to individually train models using only their own datasets. In this work, we target privacy-preserving collaborative hierarchical clustering. We introduce a formal security definition that aims to achieve balance between utility and privacy and present a two-party protocol that provably satisfies it. We then extend our protocol with: (i) an optimized version for single-linkage clustering, and (ii) scalable approximation variants. We implement all our schemes and experimentally evaluate their performance and accuracy on synthetic and real datasets, obtaining very encouraging results. For example, end-to-end execution of our secure approximate protocol for over 1M 10-dimensional data samples requires 35sec of computation and achieves 97.09% accuracy.
在协作学习中,多方提供他们的数据集,共同推断出用于许多预测任务的全局机器学习模型。尽管这种学习模式很有效,但它无法涵盖涉及高度敏感数据的关键应用领域,例如医疗保健和安全分析,在这些领域,隐私风险限制了实体仅使用自己的数据集单独训练模型。在这项工作中,我们的目标是保护隐私的协作分层聚类。我们引入了一个正式的安全定义,旨在实现效用和隐私之间的平衡,并提出了一个可证明满足这一平衡的双方协议。然后我们扩展了我们的协议:(i)单链接集群的优化版本,以及(ii)可扩展的近似变体。我们实现了所有的方案,并在合成数据集和真实数据集上实验评估了它们的性能和准确性,获得了非常令人鼓舞的结果。例如,对于超过1M个10维数据样本,端到端执行我们的安全近似协议需要35秒的计算,准确率达到97.09%。
{"title":"Private Hierarchical Clustering and Efficient Approximation","authors":"Xianrui Meng, D. Papadopoulos, Alina Oprea, Nikos Triandopoulos","doi":"10.1145/3474123.3486760","DOIUrl":"https://doi.org/10.1145/3474123.3486760","url":null,"abstract":"In collaborative learning, multiple parties contribute their datasets to jointly deduce global machine learning models for numerous predictive tasks. Despite its efficacy, this learning paradigm fails to encompass critical application domains that involve highly sensitive data, such as healthcare and security analytics, where privacy risks limit entities to individually train models using only their own datasets. In this work, we target privacy-preserving collaborative hierarchical clustering. We introduce a formal security definition that aims to achieve balance between utility and privacy and present a two-party protocol that provably satisfies it. We then extend our protocol with: (i) an optimized version for single-linkage clustering, and (ii) scalable approximation variants. We implement all our schemes and experimentally evaluate their performance and accuracy on synthetic and real datasets, obtaining very encouraging results. For example, end-to-end execution of our secure approximate protocol for over 1M 10-dimensional data samples requires 35sec of computation and achieves 97.09% accuracy.","PeriodicalId":109533,"journal":{"name":"Proceedings of the 2021 on Cloud Computing Security Workshop","volume":"212 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2021 on Cloud Computing Security Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1