首页 > 最新文献

2019 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles 确保道路车辆电子控制单元的安全可靠运行
Pub Date : 2019-05-23 DOI: 10.1109/SPW.2019.00032
Florian Kohnhäuser, Dominik Püllen, S. Katzenbeisser
With the increasing connectivity and complexity of road vehicles, security heavily impacts the safety of vehicles. In fact, researchers demonstrated that the lack of security in vehicles can lead to dangerous and even life-threatening situations. A threat that has been insufficiently addressed in existing vehicular security solutions are software attacks, in which the adversary compromises the software of Electronic Control Units (ECUs). A promising technique to defend against software attacks is remote attestation, as it enables to detect compromised devices. This paper presents a novel attestation scheme that ensures the software integrity of ECUs to warrant the vehicle's safety. In our scheme, a trusted master ECU verifies the integrity of all safety-critical ECUs and refuses to start the engine in case an untrustworthy, and hence, unsafe state is detected. As modern vehicles are highly heterogeneous system of systems, we propose two different attestation techniques that enable the attestation of simple ECUs, such as basic sensors or actuators, as well as advanced, more complex ECUs like sensor fusion systems. We implement our attestation scheme on an exemplary automotive network that incorporates CAN and Ethernet, and show that our solution imposes an imperceptible overhead for passengers.
随着道路车辆的互联性和复杂性不断提高,安全问题严重影响着车辆的安全。事实上,研究人员证明,车辆缺乏安全性会导致危险甚至危及生命的情况。在现有的车辆安全解决方案中,没有充分解决的威胁是软件攻击,攻击者会破坏电子控制单元(ecu)的软件。防御软件攻击的一种很有前途的技术是远程认证,因为它可以检测到受损的设备。本文提出了一种新的认证方案,以保证ecu软件的完整性,保证车辆的安全性。在我们的方案中,受信任的主ECU验证所有安全关键ECU的完整性,并在检测到不可信的不安全状态时拒绝启动发动机。由于现代车辆是高度异构的系统系统,我们提出了两种不同的认证技术,可以对简单的ecu(如基本传感器或执行器)以及先进的、更复杂的ecu(如传感器融合系统)进行认证。我们在一个包含CAN和以太网的典型汽车网络上实施了我们的认证方案,并表明我们的解决方案给乘客带来了难以察觉的开销。
{"title":"Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles","authors":"Florian Kohnhäuser, Dominik Püllen, S. Katzenbeisser","doi":"10.1109/SPW.2019.00032","DOIUrl":"https://doi.org/10.1109/SPW.2019.00032","url":null,"abstract":"With the increasing connectivity and complexity of road vehicles, security heavily impacts the safety of vehicles. In fact, researchers demonstrated that the lack of security in vehicles can lead to dangerous and even life-threatening situations. A threat that has been insufficiently addressed in existing vehicular security solutions are software attacks, in which the adversary compromises the software of Electronic Control Units (ECUs). A promising technique to defend against software attacks is remote attestation, as it enables to detect compromised devices. This paper presents a novel attestation scheme that ensures the software integrity of ECUs to warrant the vehicle's safety. In our scheme, a trusted master ECU verifies the integrity of all safety-critical ECUs and refuses to start the engine in case an untrustworthy, and hence, unsafe state is detected. As modern vehicles are highly heterogeneous system of systems, we propose two different attestation techniques that enable the attestation of simple ECUs, such as basic sensors or actuators, as well as advanced, more complex ECUs like sensor fusion systems. We implement our attestation scheme on an exemplary automotive network that incorporates CAN and Ethernet, and show that our solution imposes an imperceptible overhead for passengers.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128824578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output 开关人:一个易于使用的方法,以确保用户输入和输出
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00029
Shengbao Zheng, Zhenyu Zhou, Heyi Tang, Xiaowei Yang
Modern operating systems for personal computers (including Linux, MAC, and Windows) provide user-level APIs for an application to access the I/O paths of another application. This design facilitates information sharing between applications, enabling applications such as screenshots. However, it also enables user-level malware to log a user's keystrokes or scrape a user's screen output. In this work, we explore a design called SwitchMan to protect a user's I/O paths against user-level malware attacks. SwitchMan assigns each user with two accounts: a regular one for normal operations and a protected one for inputting and outputting sensitive data. Each user account runs under a separate virtual terminal. Malware running under a user's regular account cannot access sensitive input/output under a user's protected account. At the heart of SwitchMan lies a secure protocol that enables automatic account switching when an application requires sensitive input/output from a user. Our performance evaluation shows that SwitchMan adds acceptable performance overhead. Our security and usability analysis suggests that SwitchMan achieves a better tradeoff between security and usability than existing solutions.
用于个人计算机的现代操作系统(包括Linux、MAC和Windows)为应用程序访问另一个应用程序的I/O路径提供了用户级api。这种设计促进了应用程序之间的信息共享,支持截图等应用程序。然而,它也允许用户级恶意软件记录用户的击键或抓取用户的屏幕输出。在这项工作中,我们探索了一种名为SwitchMan的设计,以保护用户的I/O路径免受用户级恶意软件攻击。SwitchMan为每个用户分配两个帐号,一个是用于正常操作的普通帐号,一个是用于敏感数据输入和输出的保护帐号。每个用户帐户在一个单独的虚拟终端下运行。在用户的普通帐户下运行的恶意软件无法访问用户受保护帐户下的敏感输入/输出。SwitchMan的核心是一个安全协议,当应用程序需要用户的敏感输入/输出时,可以自动切换帐户。我们的性能评估表明SwitchMan增加了可接受的性能开销。我们的安全性和可用性分析表明,SwitchMan在安全性和可用性之间实现了比现有解决方案更好的权衡。
{"title":"SwitchMan: An Easy-to-Use Approach to Secure User Input and Output","authors":"Shengbao Zheng, Zhenyu Zhou, Heyi Tang, Xiaowei Yang","doi":"10.1109/SPW.2019.00029","DOIUrl":"https://doi.org/10.1109/SPW.2019.00029","url":null,"abstract":"Modern operating systems for personal computers (including Linux, MAC, and Windows) provide user-level APIs for an application to access the I/O paths of another application. This design facilitates information sharing between applications, enabling applications such as screenshots. However, it also enables user-level malware to log a user's keystrokes or scrape a user's screen output. In this work, we explore a design called SwitchMan to protect a user's I/O paths against user-level malware attacks. SwitchMan assigns each user with two accounts: a regular one for normal operations and a protected one for inputting and outputting sensitive data. Each user account runs under a separate virtual terminal. Malware running under a user's regular account cannot access sensitive input/output under a user's protected account. At the heart of SwitchMan lies a secure protocol that enables automatic account switching when an application requires sensitive input/output from a user. Our performance evaluation shows that SwitchMan adds acceptable performance overhead. Our security and usability analysis suggests that SwitchMan achieves a better tradeoff between security and usability than existing solutions.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting 打字错误的Smörgåsbord:探索国际键盘布局排字
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00043
V. Pochat, Tom van Goethem, W. Joosen
Typosquatting is the malicious practice of registering domains that result from typos made when users try to visit popular domains. Previous works have only considered the US English keyboard layout, but of course other layouts are widely used around the world. In this paper, we uncover how typosquatters are also targeting communities that use these other layouts by examining typo domains on non-US English keyboards for 100 000 popular domains. We find that German users are the most targeted, with over 15 000 registered typo domains. Companies such as Equifax and Amazon have defensively registered such domains but are often incomplete; moreover, other major companies ignore them altogether and allow malicious actors to capitalize on their brand. Parking domains or advertising them for sale remains the most popular monetization strategy of squatters on at least 40% of registered domains, but we also see more harmful practices, such as a scam website that spoofs a local newspaper. This proves that domain squatters also consider typos on non-US English keyboards to be valuable, and that companies should be more alert in claiming these domains.
typposquatting是一种恶意注册域名的行为,这种行为是由于用户试图访问热门域名时出现的拼写错误而导致的。以前的作品只考虑了美式英语键盘布局,当然其他布局在世界各地都被广泛使用。在本文中,我们发现typposquatters如何通过检查非美国英语键盘上的10万个流行域名的typo域来瞄准使用这些其他布局的社区。我们发现德国用户是最有针对性的,有超过15000个注册的typo域名。Equifax和亚马逊等公司已经防御性地注册了这类域名,但往往不完整;此外,其他大公司完全忽略了它们,并允许恶意行为者利用它们的品牌。在至少40%的已注册域名中,停放域名或打广告出售域名仍然是抢注者最流行的盈利策略,但我们也看到了更多有害的做法,比如一个欺骗当地报纸的诈骗网站。这证明,域名抢注者也认为非美国英语键盘上的错别字很有价值,企业在申请这些域名时应更加警惕。
{"title":"A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting","authors":"V. Pochat, Tom van Goethem, W. Joosen","doi":"10.1109/SPW.2019.00043","DOIUrl":"https://doi.org/10.1109/SPW.2019.00043","url":null,"abstract":"Typosquatting is the malicious practice of registering domains that result from typos made when users try to visit popular domains. Previous works have only considered the US English keyboard layout, but of course other layouts are widely used around the world. In this paper, we uncover how typosquatters are also targeting communities that use these other layouts by examining typo domains on non-US English keyboards for 100 000 popular domains. We find that German users are the most targeted, with over 15 000 registered typo domains. Companies such as Equifax and Amazon have defensively registered such domains but are often incomplete; moreover, other major companies ignore them altogether and allow malicious actors to capitalize on their brand. Parking domains or advertising them for sale remains the most popular monetization strategy of squatters on at least 40% of registered domains, but we also see more harmful practices, such as a scam website that spoofs a local newspaper. This proves that domain squatters also consider typos on non-US English keyboards to be valuable, and that companies should be more alert in claiming these domains.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132104242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete 基于自动补全的搜索引擎击键定时攻击的可行性
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00047
John V. Monaco
Many websites induce the browser to send network traffic in response to user input events. This includes websites with autocomplete, a popular feature on search engines that anticipates the user's query while they are typing. Websites with this functionality require HTTP requests to be made as the query input field changes, such as when the user presses a key. The browser responds to input events by generating network traffic to retrieve the search predictions. The traffic emitted by the client can expose the timings of keyboard input events which may lead to a keylogging side channel attack whereby the query is revealed through packet inter-arrival times. We investigate the feasibility of such an attack on several popular search engines by characterizing the behavior of each website and measuring information leakage at the network level. Three out of the five search engines we measure preserve the mutual information between keystrokes and timings to within 1% of what it is on the host. We describe the ways in which two search engines mitigate this vulnerability with minimal effects on usability.
许多网站诱导浏览器发送网络流量以响应用户输入事件。这包括带有自动补全功能的网站,这是搜索引擎上的一个流行功能,可以在用户输入时预测用户的查询。具有此功能的网站需要在查询输入字段发生变化时发出HTTP请求,例如当用户按下一个键时。浏览器通过生成网络流量来检索搜索预测,从而响应输入事件。客户端发出的流量可以暴露键盘输入事件的时间,这可能导致键盘记录侧信道攻击,从而通过数据包到达时间揭示查询。我们通过描述每个网站的行为和测量网络层面的信息泄漏来研究对几个流行搜索引擎进行这种攻击的可行性。我们测量的五个搜索引擎中有三个将键盘敲击和计时之间的相互信息保留在主机上的1%以内。我们描述了两种搜索引擎在对可用性影响最小的情况下减轻此漏洞的方法。
{"title":"Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete","authors":"John V. Monaco","doi":"10.1109/SPW.2019.00047","DOIUrl":"https://doi.org/10.1109/SPW.2019.00047","url":null,"abstract":"Many websites induce the browser to send network traffic in response to user input events. This includes websites with autocomplete, a popular feature on search engines that anticipates the user's query while they are typing. Websites with this functionality require HTTP requests to be made as the query input field changes, such as when the user presses a key. The browser responds to input events by generating network traffic to retrieve the search predictions. The traffic emitted by the client can expose the timings of keyboard input events which may lead to a keylogging side channel attack whereby the query is revealed through packet inter-arrival times. We investigate the feasibility of such an attack on several popular search engines by characterizing the behavior of each website and measuring information leakage at the network level. Three out of the five search engines we measure preserve the mutual information between keystrokes and timings to within 1% of what it is on the host. We describe the ways in which two search engines mitigate this vulnerability with minimal effects on usability.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117073374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning 基于全局扫描的DNS AXFR传输漏洞分析
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00044
Marcin Skwarek, Maciej Korczyński, W. Mazurczyk, A. Duda
In this paper, we consider security issues related to zone transfers by investigating the responses of DNS servers to AXFR requests. In particular, we investigate how attackers can exploit available AXFR zone transfers to obtain useful reconnaissance data. To evaluate the extent of the security flaw, we have scanned DNS servers on a global scale with a dedicated tool and transferred multi-line zone files of 3.6M domains. We have first analyzed the experimental data to evaluate the size of the DNS zones. Then, we have investigated what kind of information zone transfers may reveal to attackers. We have also studied the information on chosen services that attackers can use in further attacks and analyzed potential security problems such as enumerating open SMTP relays or domains vulnerable to DNS hijacking. Finally, we have proposed potential remediation strategies to improve the security of the DNS ecosystem.
在本文中,我们通过调查DNS服务器对AXFR请求的响应来考虑与区域传输相关的安全问题。特别是,我们研究了攻击者如何利用可用的AXFR区域传输来获取有用的侦察数据。为了评估安全漏洞的严重程度,我们使用专用工具对全球范围内的DNS服务器进行了扫描,并传输了360万个域名的多行区域文件。我们首先分析了实验数据来评估DNS区域的大小。然后,我们调查了哪些类型的信息区域传输可能会泄露给攻击者。我们还研究了攻击者可以在进一步攻击中使用的选定服务的信息,并分析了潜在的安全问题,例如列举易受DNS劫持攻击的开放SMTP中继或域。最后,我们提出了改善DNS生态系统安全性的潜在补救策略。
{"title":"Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning","authors":"Marcin Skwarek, Maciej Korczyński, W. Mazurczyk, A. Duda","doi":"10.1109/SPW.2019.00044","DOIUrl":"https://doi.org/10.1109/SPW.2019.00044","url":null,"abstract":"In this paper, we consider security issues related to zone transfers by investigating the responses of DNS servers to AXFR requests. In particular, we investigate how attackers can exploit available AXFR zone transfers to obtain useful reconnaissance data. To evaluate the extent of the security flaw, we have scanned DNS servers on a global scale with a dedicated tool and transferred multi-line zone files of 3.6M domains. We have first analyzed the experimental data to evaluate the size of the DNS zones. Then, we have investigated what kind of information zone transfers may reveal to attackers. We have also studied the information on chosen services that attackers can use in further attacks and analyzed potential security problems such as enumerating open SMTP relays or domains vulnerable to DNS hijacking. Finally, we have proposed potential remediation strategies to improve the security of the DNS ecosystem.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge 在黑暗深处——基于深度学习的恶意软件流量检测,无需专家知识
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00019
Gonzalo Marín, P. Casas, G. Capdehourat
With the ever-growing occurrence of networking attacks, robust network security systems are essential to prevent and mitigate their harming effects. In recent years, machine learning-based systems have gain popularity for network security applications, usually considering the application of shallow models, where a set of expert handcrafted features are needed to pre-process the data before training. The main problem with this approach is that handcrafted features can fail to perform well given different kinds of scenarios and problems. Deep Learning models can solve this kind of issues using their ability to learn feature representations from input raw or basic, non-processed data. In this paper we explore the power of deep learning models on the specific problem of detection and classification of malware network traffic, using different representations for the input data. As a major advantage as compared to the state of the art, we consider raw measurements coming directly from the stream of monitored bytes as the input to the proposed models, and evaluate different raw-traffic feature representations, including packet and flow-level ones. Our results suggest that deep learning models can better capture the underlying statistics of malicious traffic as compared to classical, shallow-like models, even while operating in the dark, i.e., without any sort of expert handcrafted inputs.
随着网络攻击的不断发生,强大的网络安全系统对于预防和减轻网络攻击的危害至关重要。近年来,基于机器学习的系统在网络安全应用中越来越受欢迎,通常考虑浅模型的应用,在训练前需要一组专家手工制作的特征对数据进行预处理。这种方法的主要问题是,在不同的场景和问题下,手工制作的功能可能无法很好地执行。深度学习模型可以利用它们从输入的原始或基本、未处理的数据中学习特征表示的能力来解决这类问题。在本文中,我们探索了深度学习模型在恶意软件网络流量检测和分类的具体问题上的能力,使用不同的输入数据表示。与目前的技术相比,我们的一个主要优势是,我们将直接来自监控字节流的原始测量作为所提议模型的输入,并评估不同的原始流量特征表示,包括数据包和流级别的特征表示。我们的研究结果表明,与经典的浅层模型相比,深度学习模型可以更好地捕获恶意流量的底层统计数据,即使在黑暗中运行,也就是说,没有任何专家手工制作的输入。
{"title":"Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge","authors":"Gonzalo Marín, P. Casas, G. Capdehourat","doi":"10.1109/SPW.2019.00019","DOIUrl":"https://doi.org/10.1109/SPW.2019.00019","url":null,"abstract":"With the ever-growing occurrence of networking attacks, robust network security systems are essential to prevent and mitigate their harming effects. In recent years, machine learning-based systems have gain popularity for network security applications, usually considering the application of shallow models, where a set of expert handcrafted features are needed to pre-process the data before training. The main problem with this approach is that handcrafted features can fail to perform well given different kinds of scenarios and problems. Deep Learning models can solve this kind of issues using their ability to learn feature representations from input raw or basic, non-processed data. In this paper we explore the power of deep learning models on the specific problem of detection and classification of malware network traffic, using different representations for the input data. As a major advantage as compared to the state of the art, we consider raw measurements coming directly from the stream of monitored bytes as the input to the proposed models, and evaluate different raw-traffic feature representations, including packet and flow-level ones. Our results suggest that deep learning models can better capture the underlying statistics of malicious traffic as compared to classical, shallow-like models, even while operating in the dark, i.e., without any sort of expert handcrafted inputs.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132226279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps 基于智能设备配套应用的智能设备漏洞分析研究
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00042
Davino Mauro Junior, L. Melo, Hao Lu, Marcelo d’Amorim, A. Prakash
Security of Internet of Things (IoT) devices is a well-known concern as these devices come in increasing use in homes and commercial environments. To better understand the extent to which companies take security of the IoT devices seriously and the methods they use to secure them, this paper presents findings from a security analysis of 96 top-selling WiFi IoT devices on Amazon. We found that we could carry out a significant portion of the analysis by first analyzing the code of Android companion apps responsible for controlling the devices. An interesting finding was that these devices used only 32 unique companion apps; we found instances of devices from same as well as different brands sharing the same app, significantly reducing our work. We analyzed the code of these companion apps to understand how they communicated with the devices and the security of that communication. We found security problems to be widespread: 50% of the apps corresponding to 38% of the devices did not use proper encryption techniques; some even used well-known weak ciphers such as Caesar cipher. We also purchased 5 devices and confirmed the vulnerabilities found with exploits. In some cases, we were able to bypass the pairing process and still control the device. Finally, we comment on technical and non-technical lessons learned from the study that have security implications.
物联网(IoT)设备的安全性是一个众所周知的问题,因为这些设备在家庭和商业环境中的使用越来越多。为了更好地了解公司对物联网设备安全的重视程度以及他们使用的保护方法,本文介绍了对亚马逊上96个最畅销的WiFi物联网设备的安全分析结果。我们发现,我们可以通过首先分析负责控制设备的Android配套应用的代码来进行很大一部分分析。一个有趣的发现是,这些设备只使用32个独特的配套应用;我们发现来自同一品牌和不同品牌的设备共享同一款应用,这大大减少了我们的工作量。我们分析了这些配套应用程序的代码,以了解它们如何与设备通信以及通信的安全性。我们发现安全问题很普遍:38%的设备对应的50%的应用程序没有使用适当的加密技术;有些人甚至使用了众所周知的弱密码,如凯撒密码。我们还购买了5台设备,并确认了发现的漏洞。在某些情况下,我们能够绕过配对过程,仍然控制设备。最后,我们对从具有安全含义的研究中获得的技术和非技术经验教训进行了评论。
{"title":"A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps","authors":"Davino Mauro Junior, L. Melo, Hao Lu, Marcelo d’Amorim, A. Prakash","doi":"10.1109/SPW.2019.00042","DOIUrl":"https://doi.org/10.1109/SPW.2019.00042","url":null,"abstract":"Security of Internet of Things (IoT) devices is a well-known concern as these devices come in increasing use in homes and commercial environments. To better understand the extent to which companies take security of the IoT devices seriously and the methods they use to secure them, this paper presents findings from a security analysis of 96 top-selling WiFi IoT devices on Amazon. We found that we could carry out a significant portion of the analysis by first analyzing the code of Android companion apps responsible for controlling the devices. An interesting finding was that these devices used only 32 unique companion apps; we found instances of devices from same as well as different brands sharing the same app, significantly reducing our work. We analyzed the code of these companion apps to understand how they communicated with the devices and the security of that communication. We found security problems to be widespread: 50% of the apps corresponding to 38% of the devices did not use proper encryption techniques; some even used well-known weak ciphers such as Caesar cipher. We also purchased 5 devices and confirmed the vulnerabilities found with exploits. In some cases, we were able to bypass the pairing process and still control the device. Finally, we comment on technical and non-technical lessons learned from the study that have security implications.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations 利用欺骗性摄动防御神经网络模型窃取攻击
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00020
Taesung Lee, Ben Edwards, Ian Molloy, D. Su
Machine learning architectures are readily available, but obtaining the high quality labeled data for training is costly. Pre-trained models available as cloud services can be used to generate this costly labeled data, and would allow an attacker to replicate trained models, effectively stealing them. Limiting the information provided by cloud based models by omitting class probabilities has been proposed as a means of protection but significantly impacts the utility of the models. In this work, we illustrate how cloud based models can still provide useful class probability information for users, while significantly limiting the ability of an adversary to steal the model. Our defense perturbs the model's final activation layer, slightly altering the output probabilities. This forces the adversary to discard the class probabilities, requiring significantly more queries before they can train a model with comparable performance. We evaluate our defense under diverse scenarios and defense aware attacks. Our evaluation shows our defense can degrade the accuracy of the stolen model at least 20%, or increase the number of queries required by an adversary 64 fold, all with a negligible decrease in the protected model accuracy.
机器学习架构很容易获得,但是获得高质量的标记数据用于训练是昂贵的。作为云服务可用的预训练模型可用于生成这种昂贵的标记数据,并且允许攻击者复制训练过的模型,有效地窃取它们。通过省略类别概率来限制基于云的模型提供的信息已被提议作为一种保护手段,但会严重影响模型的效用。在这项工作中,我们说明了基于云的模型如何仍然可以为用户提供有用的类概率信息,同时显着限制对手窃取模型的能力。我们的防御干扰了模型的最终激活层,稍微改变了输出概率。这迫使对手放弃类概率,在训练具有可比性能的模型之前需要进行更多的查询。我们在不同的场景和防御意识攻击下评估我们的防御。我们的评估表明,我们的防御可以将被盗模型的准确性降低至少20%,或者将对手所需的查询数量增加64倍,所有这些都可以忽略受保护模型准确性的降低。
{"title":"Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations","authors":"Taesung Lee, Ben Edwards, Ian Molloy, D. Su","doi":"10.1109/SPW.2019.00020","DOIUrl":"https://doi.org/10.1109/SPW.2019.00020","url":null,"abstract":"Machine learning architectures are readily available, but obtaining the high quality labeled data for training is costly. Pre-trained models available as cloud services can be used to generate this costly labeled data, and would allow an attacker to replicate trained models, effectively stealing them. Limiting the information provided by cloud based models by omitting class probabilities has been proposed as a means of protection but significantly impacts the utility of the models. In this work, we illustrate how cloud based models can still provide useful class probability information for users, while significantly limiting the ability of an adversary to steal the model. Our defense perturbs the model's final activation layer, slightly altering the output probabilities. This forces the adversary to discard the class probabilities, requiring significantly more queries before they can train a model with comparable performance. We evaluate our defense under diverse scenarios and defense aware attacks. Our evaluation shows our defense can degrade the accuracy of the stolen model at least 20%, or increase the number of queries required by an adversary 64 fold, all with a negligible decrease in the protected model accuracy.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123315902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Demo: An Emulator-Based Active Protection System Against IoT Malware 演示:基于模拟器的物联网恶意软件主动防护系统
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00038
Shin-Ming Cheng, Shengfu Ma
This demonstration presents an emulator-based active protection system particularly for IoT malware identification and blocking. The key component of our system is a new design of an application loader and an emulating engine based on Unicorn. We demonstrate using IoT network consisting of IoT gateway and IoT devices where the proposed system can be enabled in face of the infamous Mirai attack. We show that with the aid of emulation engine, malicious commands triggered by Telnet and SSH-based IoT malware can be identified and blocked effectively and efficiently while eliminating the possibility of virtual machine escalation.
本演示展示了一个基于模拟器的主动保护系统,特别是用于物联网恶意软件识别和阻止。该系统的关键部分是基于Unicorn的应用程序加载器和仿真引擎的新设计。我们使用由物联网网关和物联网设备组成的物联网网络进行演示,其中所提议的系统可以在面对臭名昭着的Mirai攻击时启用。我们证明,借助仿真引擎,可以有效地识别和阻止Telnet和基于ssh的物联网恶意软件触发的恶意命令,同时消除虚拟机升级的可能性。
{"title":"Demo: An Emulator-Based Active Protection System Against IoT Malware","authors":"Shin-Ming Cheng, Shengfu Ma","doi":"10.1109/SPW.2019.00038","DOIUrl":"https://doi.org/10.1109/SPW.2019.00038","url":null,"abstract":"This demonstration presents an emulator-based active protection system particularly for IoT malware identification and blocking. The key component of our system is a new design of an application loader and an emulating engine based on Unicorn. We demonstrate using IoT network consisting of IoT gateway and IoT devices where the proposed system can be enabled in face of the infamous Mirai attack. We show that with the aid of emulation engine, malicious commands triggered by Telnet and SSH-based IoT malware can be identified and blocked effectively and efficiently while eliminating the possibility of virtual machine escalation.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132157580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT SpyCon:人在环物联网中基于适应的间谍软件
Pub Date : 2019-05-19 DOI: 10.1109/SPW.2019.00039
Salma Elmalaki, Bo-Jhang Ho, M. Alzantot, Yasser Shoukry, M. Srivastava
Personalized IoT adapt their behavior based on contextual information, such as user behavior and location. Unfortunately, the fact that personalized IoT adapt to user context opens a side-channel that leaks private information about the user. To that end, we start by studying the extent to which a malicious eavesdropper can monitor the actions taken by an IoT system and extract user's private information. In particular, we show two concrete instantiations (in the context of mobile phones and smart homes) of a new category of spyware which we refer to as Context-Aware Adaptation Based Spyware (SpyCon). Experimental evaluations show that the developed SpyCon can predict users' daily behavior with an accuracy of 90.3%. Being a new spyware with no known prior signature or behavior, traditional spyware detection that is based on code signature or system behavior are not adequate to detect SpyCon. We discuss possible detection and mitigation mechanisms that can hinder the effect of SpyCon.
个性化物联网根据上下文信息(如用户行为和位置)调整其行为。不幸的是,个性化物联网适应用户环境的事实打开了一个泄漏用户私人信息的侧通道。为此,我们首先研究恶意窃听者可以在多大程度上监控物联网系统所采取的行动并提取用户的私人信息。特别是,我们展示了两个具体的实例(在移动电话和智能家居的背景下)一类新的间谍软件,我们称之为基于上下文感知适应的间谍软件(SpyCon)。实验评估表明,开发的SpyCon可以预测用户的日常行为,准确率为90.3%。由于SpyCon是一种新的间谍软件,没有已知的先前签名或行为,传统的基于代码签名或系统行为的间谍软件检测不足以检测SpyCon。我们讨论了可能阻碍SpyCon效果的检测和缓解机制。
{"title":"SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT","authors":"Salma Elmalaki, Bo-Jhang Ho, M. Alzantot, Yasser Shoukry, M. Srivastava","doi":"10.1109/SPW.2019.00039","DOIUrl":"https://doi.org/10.1109/SPW.2019.00039","url":null,"abstract":"Personalized IoT adapt their behavior based on contextual information, such as user behavior and location. Unfortunately, the fact that personalized IoT adapt to user context opens a side-channel that leaks private information about the user. To that end, we start by studying the extent to which a malicious eavesdropper can monitor the actions taken by an IoT system and extract user's private information. In particular, we show two concrete instantiations (in the context of mobile phones and smart homes) of a new category of spyware which we refer to as Context-Aware Adaptation Based Spyware (SpyCon). Experimental evaluations show that the developed SpyCon can predict users' daily behavior with an accuracy of 90.3%. Being a new spyware with no known prior signature or behavior, traditional spyware detection that is based on code signature or system behavior are not adequate to detect SpyCon. We discuss possible detection and mitigation mechanisms that can hinder the effect of SpyCon.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1