首页 > 最新文献

J. Comput. Secur.最新文献

英文 中文
Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls 利用WiFi可用性特性进行IEEE 802.11中的关联攻击:攻击分析和缓解控制
Pub Date : 2022-04-11 DOI: 10.3233/jcs-210036
George Chatzisofroniou, P. Kotzanikolaou
Association attacks aim to manipulate WiFi clients into associating with a malicious access point, by exploiting protocol vulnerabilities and usability features implemented on the network managers of modern operating systems. In this paper we classify association attacks based on the network manager features that each attack exploits. To validate their current validity status, we implement and test all known association attacks against the network managers of popular operating systems, by using our Wifiphisher tool. We analyze various strategies that may be implemented by an adversary in order to increase the success rate of association attacks. Furthermore, we examine the behavior of association attacks against upcoming security protocols and certifications for IEEE 802.11, such as WPA3, Wi-Fi Enhanced Open and Easy Connect. Our results show that even though the network managers have hampered the effectiveness of some known attacks (e.g. KARMA), other techniques (e.g. Known Beacons) are still active threats. More importantly, our results show that even the newer security protocols leave room for association attacks. Finally, we describe novel detection and prevention techniques for association attacks, as well as security controls based on user awareness.
关联攻击的目的是通过利用现代操作系统网络管理器上的协议漏洞和可用性特性,操纵WiFi客户端与恶意接入点关联。本文根据各种攻击所利用的网络管理器特征对关联攻击进行分类。为了验证其当前的有效性状态,我们使用我们的Wifiphisher工具对流行操作系统的网络管理器实施并测试了所有已知的关联攻击。我们分析了对手可能实施的各种策略,以提高关联攻击的成功率。此外,我们还研究了针对即将推出的IEEE 802.11安全协议和认证的关联攻击行为,例如WPA3, Wi-Fi Enhanced Open and Easy Connect。我们的结果表明,尽管网络管理器已经阻碍了一些已知攻击(例如KARMA)的有效性,但其他技术(例如已知信标)仍然是活跃的威胁。更重要的是,我们的结果表明,即使是较新的安全协议也为关联攻击留下了空间。最后,我们描述了新的关联攻击检测和预防技术,以及基于用户意识的安全控制。
{"title":"Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls","authors":"George Chatzisofroniou, P. Kotzanikolaou","doi":"10.3233/jcs-210036","DOIUrl":"https://doi.org/10.3233/jcs-210036","url":null,"abstract":"Association attacks aim to manipulate WiFi clients into associating with a malicious access point, by exploiting protocol vulnerabilities and usability features implemented on the network managers of modern operating systems. In this paper we classify association attacks based on the network manager features that each attack exploits. To validate their current validity status, we implement and test all known association attacks against the network managers of popular operating systems, by using our Wifiphisher tool. We analyze various strategies that may be implemented by an adversary in order to increase the success rate of association attacks. Furthermore, we examine the behavior of association attacks against upcoming security protocols and certifications for IEEE 802.11, such as WPA3, Wi-Fi Enhanced Open and Easy Connect. Our results show that even though the network managers have hampered the effectiveness of some known attacks (e.g. KARMA), other techniques (e.g. Known Beacons) are still active threats. More importantly, our results show that even the newer security protocols leave room for association attacks. Finally, we describe novel detection and prevention techniques for association attacks, as well as security controls based on user awareness.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How to measure usable security: Natural strategies in voting protocols 如何衡量可用安全性:投票协议中的自然策略
Pub Date : 2022-04-05 DOI: 10.3233/jcs-210049
W. Jamroga, Damian Kurpiewski, Vadim Malvone
Formal analysis of security is often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the relevant security properties. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks. Here, we propose a graded notion of security based on the complexity of the user’s strategic behavior. More precisely, we suggest that the level to which a security property φ is satisfied can be defined in terms of: (a) the complexity of the strategy that the user needs to execute to make φ true, and (b) the resources that the user must employ on the way. The simpler and cheaper to obtain φ, the higher the degree of security. We demonstrate how the idea works in a case study based on an electronic voting scenario. To this end, we model the vVote implementation of the Prêt à Voter voting protocol for coercion-resistant and voter-verifiable elections. Then, we identify “natural” strategies for the voter to obtain voter-verifiability, and measure the voter’s effort that they require. We also consider the dual view of graded security, measured by the complexity of the attacker’s strategy to compromise the relevant properties of the election.
安全性的正式分析通常集中在系统的技术方面。隐式地假设用户将以正确的方式行事,以保留相关的安全属性。在现实生活中,这并不是理所当然的。特别是,使用困难且代价高昂的安全机制经常被用户忽略,并且不能真正保护系统免受可能的攻击。在这里,我们提出了一个基于用户策略行为复杂性的分级安全概念。更准确地说,我们建议满足安全属性φ的级别可以用以下方式定义:(a)用户为使φ为真而需要执行的策略的复杂性,以及(b)用户在此过程中必须使用的资源。获得φ越简单、越便宜,安全程度越高。我们在一个基于电子投票场景的案例研究中演示了这个想法是如何工作的。为此,我们模拟了Prêt 选民投票协议的vVote实现,用于抗强制和选民可验证的选举。然后,我们确定了选民获得选民可验证性的“自然”策略,并测量了选民所需的努力。我们还考虑了分级安全的双重观点,通过攻击者破坏选举相关属性的策略的复杂性来衡量。
{"title":"How to measure usable security: Natural strategies in voting protocols","authors":"W. Jamroga, Damian Kurpiewski, Vadim Malvone","doi":"10.3233/jcs-210049","DOIUrl":"https://doi.org/10.3233/jcs-210049","url":null,"abstract":"Formal analysis of security is often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the relevant security properties. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks. Here, we propose a graded notion of security based on the complexity of the user’s strategic behavior. More precisely, we suggest that the level to which a security property φ is satisfied can be defined in terms of: (a) the complexity of the strategy that the user needs to execute to make φ true, and (b) the resources that the user must employ on the way. The simpler and cheaper to obtain φ, the higher the degree of security. We demonstrate how the idea works in a case study based on an electronic voting scenario. To this end, we model the vVote implementation of the Prêt à Voter voting protocol for coercion-resistant and voter-verifiable elections. Then, we identify “natural” strategies for the voter to obtain voter-verifiability, and measure the voter’s effort that they require. We also consider the dual view of graded security, measured by the complexity of the attacker’s strategy to compromise the relevant properties of the election.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling human threats in security ceremonies 模拟安保仪式中的人类威胁
Pub Date : 2022-04-04 DOI: 10.3233/jcs-210059
G. Bella, Rosario Giustolisi, C. Schürmann
Socio-Technical Systems (STSs) combine the operations of technical systems with the choices and intervention of humans, namely the users of the technical systems. Designing such systems is far from trivial due to the interaction of heterogeneous components, including hardware components and software applications, physical elements such as tickets, user interfaces, such as touchscreens and displays, and notably, humans. While the possible security issues about the technical components are well known yet continuously investigated, the focus of this article is on the various levels of threat that human actors may pose, namely, the focus is on security ceremonies. The approach is to formally model human threats systematically and to formally verify whether they can break the security properties of a few running examples: two currently deployed Deposit-Return Systems (DRSs) and a variant that we designed to strengthen them. The two real-world DRSs are found to support security properties differently, and some relevant properties fail, yet our variant is verified to meet all the properties. Our human threat model is distributed and interacting: it formalises all humans as potential threatening users because they can execute rules that encode specific threats in addition to being honest, that is, to follow the prescribed rules of interaction with the technical system; additionally, humans may exchange information or objects directly, hence practically favour each other although no specific form of collusion is prescribed. We start by introducing four different human threat models, and some security properties are found to succumb against the strongest model, the addition of the four. The question then arises on what meaningful combinations of the four would not break the properties. This leads to the definition of a lattice of human threat models and to a general methodology to traverse it by verifying each node against the properties. The methodology is executed on our running example for the sake of demonstration. Our approach thus is modular and extensible to include additional threats, potentially even borrowed from existing works, and, consequently, to the growth of the corresponding lattice. STSs can easily become very complex, hence we deem modularity and extensibility of the human threat model as key factors. The current computer-assisted tool support is put to test but proves to be sufficient.
社会技术系统(STSs)将技术系统的操作与人类,即技术系统的用户的选择和干预结合起来。由于异构组件(包括硬件组件和软件应用程序)、物理元素(如票证)、用户界面(如触摸屏和显示器)以及特别是人类)的交互,设计这样的系统远非微不足道。虽然关于技术组件的可能的安全性问题是众所周知的,但仍在不断进行调查,本文的重点是人类参与者可能构成的各种级别的威胁,也就是说,重点是安全性仪式。该方法是系统地对人类威胁进行正式建模,并正式验证它们是否可以破坏几个运行示例的安全属性:两个当前部署的存款-返还系统(drs)和我们设计的一个变体来加强它们。我们发现这两个真实世界的drs支持不同的安全属性,并且一些相关属性失败,但是我们的变体被验证满足所有属性。我们的人类威胁模型是分布式和交互的:它将所有人类形式化为潜在的威胁用户,因为他们除了诚实之外,还可以执行编码特定威胁的规则,即遵循与技术系统交互的规定规则;此外,人类可以直接交换信息或物品,因此实际上有利于彼此,尽管没有规定具体形式的勾结。我们首先介绍四种不同的人类威胁模型,并且发现一些安全属性会屈服于最强的模型,即这四种模型的相加。那么问题来了,这四个有意义的组合将不会破坏属性。这导致了人类威胁模型晶格的定义,以及通过根据属性验证每个节点来遍历它的通用方法。为了演示,该方法在我们的运行示例中执行。因此,我们的方法是模块化的,可扩展的,包括额外的威胁,甚至可能从现有的作品中借鉴,因此,相应的晶格的增长。人为威胁模型很容易变得非常复杂,因此我们认为人为威胁模型的模块化和可扩展性是关键因素。目前的计算机辅助工具支持进行了测试,但证明是足够的。
{"title":"Modelling human threats in security ceremonies","authors":"G. Bella, Rosario Giustolisi, C. Schürmann","doi":"10.3233/jcs-210059","DOIUrl":"https://doi.org/10.3233/jcs-210059","url":null,"abstract":"Socio-Technical Systems (STSs) combine the operations of technical systems with the choices and intervention of humans, namely the users of the technical systems. Designing such systems is far from trivial due to the interaction of heterogeneous components, including hardware components and software applications, physical elements such as tickets, user interfaces, such as touchscreens and displays, and notably, humans. While the possible security issues about the technical components are well known yet continuously investigated, the focus of this article is on the various levels of threat that human actors may pose, namely, the focus is on security ceremonies. The approach is to formally model human threats systematically and to formally verify whether they can break the security properties of a few running examples: two currently deployed Deposit-Return Systems (DRSs) and a variant that we designed to strengthen them. The two real-world DRSs are found to support security properties differently, and some relevant properties fail, yet our variant is verified to meet all the properties. Our human threat model is distributed and interacting: it formalises all humans as potential threatening users because they can execute rules that encode specific threats in addition to being honest, that is, to follow the prescribed rules of interaction with the technical system; additionally, humans may exchange information or objects directly, hence practically favour each other although no specific form of collusion is prescribed. We start by introducing four different human threat models, and some security properties are found to succumb against the strongest model, the addition of the four. The question then arises on what meaningful combinations of the four would not break the properties. This leads to the definition of a lattice of human threat models and to a general methodology to traverse it by verifying each node against the properties. The methodology is executed on our running example for the sake of demonstration. Our approach thus is modular and extensible to include additional threats, potentially even borrowed from existing works, and, consequently, to the growth of the corresponding lattice. STSs can easily become very complex, hence we deem modularity and extensibility of the human threat model as key factors. The current computer-assisted tool support is put to test but proves to be sufficient.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116881560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scriptable and composable SNARKs in the trusted hardware model 可信硬件模型中的可脚本化和可组合的snark
Pub Date : 2022-04-01 DOI: 10.3233/jcs-210167
Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, K. Ren, Phuc Thai, Hong-Sheng Zhou
Non-interactive zero-knowledge proof or argument (NIZK) systems are widely used in many security sensitive applications to enhance computation integrity, privacy and scalability. In such systems, a prover wants to convince one or more verifiers that the result of a public function is correctly computed without revealing the (potential) private input, such as the witness. In this work, we introduce a new notion, called scriptable SNARK, where the prover and verifier(s) can specify the function (or language instance) to be proven via a script. We formalize this notion in UC framework and provide a generic trusted hardware based solution. We then instantiate our solution in both SGX and Trustzone with Lua script engine. The system can be easily used by typical programmers without any cryptographic background. The benchmark result shows that our solution is better than all the known SNARK proof systems w.r.t. prover’s running time (1000 times faster), verifier’s running time, and the proof size. In addition, we also give a lightweight scriptable SNARK protocol for hardware with limited state, e.g., Θ ( λ ) bits. Finally, we show how the proposed scriptable SNARK can be readily deployed to solve many well-known problems in the blockchain context, e.g. verifier’s dilemma, fast joining for new players, etc.
非交互式零知识证明或论证(NIZK)系统被广泛应用于许多安全敏感的应用中,以提高计算的完整性、保密性和可扩展性。在这样的系统中,证明者希望让一个或多个验证者相信,公共函数的结果是正确计算的,而不会泄露(潜在的)私有输入,例如证人。在这项工作中,我们引入了一个新的概念,称为可脚本的SNARK,其中证明者和验证者可以指定要通过脚本证明的函数(或语言实例)。我们在UC框架中形式化了这一概念,并提供了一个基于通用可信硬件的解决方案。然后,我们使用Lua脚本引擎在SGX和Trustzone中实例化我们的解决方案。该系统可以很容易地被没有任何密码学背景的典型程序员使用。基准测试结果表明,我们的解决方案优于所有已知的SNARK证明系统w.r.t.证明者的运行时间(快1000倍),验证者的运行时间和证明大小。此外,我们还为状态有限的硬件提供了一个轻量级的可脚本化SNARK协议,例如Θ (λ)位。最后,我们展示了所提出的可脚本化的SNARK如何容易地部署来解决区块链环境中的许多众所周知的问题,例如验证者的困境,新玩家的快速加入等。
{"title":"Scriptable and composable SNARKs in the trusted hardware model","authors":"Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, K. Ren, Phuc Thai, Hong-Sheng Zhou","doi":"10.3233/jcs-210167","DOIUrl":"https://doi.org/10.3233/jcs-210167","url":null,"abstract":"Non-interactive zero-knowledge proof or argument (NIZK) systems are widely used in many security sensitive applications to enhance computation integrity, privacy and scalability. In such systems, a prover wants to convince one or more verifiers that the result of a public function is correctly computed without revealing the (potential) private input, such as the witness. In this work, we introduce a new notion, called scriptable SNARK, where the prover and verifier(s) can specify the function (or language instance) to be proven via a script. We formalize this notion in UC framework and provide a generic trusted hardware based solution. We then instantiate our solution in both SGX and Trustzone with Lua script engine. The system can be easily used by typical programmers without any cryptographic background. The benchmark result shows that our solution is better than all the known SNARK proof systems w.r.t. prover’s running time (1000 times faster), verifier’s running time, and the proof size. In addition, we also give a lightweight scriptable SNARK protocol for hardware with limited state, e.g., Θ ( λ ) bits. Finally, we show how the proposed scriptable SNARK can be readily deployed to solve many well-known problems in the blockchain context, e.g. verifier’s dilemma, fast joining for new players, etc.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure protocols for cumulative reward maximization in stochastic multi-armed bandits 随机多武装盗匪中累积奖励最大化的安全协议
Pub Date : 2022-02-02 DOI: 10.3233/jcs-210051
Radu Ciucanu, P. Lafourcade, Marius Lombard-Platet, Marta Soare
We consider the problem of cumulative reward maximization in multi-armed bandits. We address the security concerns that occur when data and computations are outsourced to an honest-but-curious cloud i.e., that executes tasks dutifully, but tries to gain as much information as possible. We consider situations where data used in bandit algorithms is sensitive and has to be protected e.g., commercial or personal data. We rely on cryptographic schemes and propose UCB - MS, a secure multi-party protocol based on the UCB algorithm. We prove that UCB - MS computes the same cumulative reward as UCB while satisfying desirable security properties. In particular, cloud nodes cannot learn the cumulative reward or the sum of rewards for more than one arm. Moreover, by analyzing messages exchanged among cloud nodes, an external observer cannot learn the cumulative reward or the sum of rewards produced by some arm. We show that the overhead due to cryptographic primitives is linear in the size of the input. Our implementation confirms the linear-time behavior and the practical feasibility of our protocol, on both synthetic and real-world data.
研究多武装盗匪的累积报酬最大化问题。我们解决了当数据和计算被外包给一个诚实但好奇的云(即尽职尽责地执行任务,但试图获取尽可能多的信息)时出现的安全问题。我们考虑在强盗算法中使用的数据是敏感的,必须受到保护的情况,例如商业或个人数据。本文以加密方案为基础,提出了基于UCB算法的安全多方协议UCB - MS。我们证明了UCB - MS在满足理想的安全特性的同时计算出与UCB相同的累积奖励。特别是,云节点无法学习累积奖励或多个手臂的奖励总和。此外,通过分析云节点之间交换的消息,外部观察者无法了解到某个手臂产生的累积奖励或奖励总和。我们表明,由于密码原语的开销在输入的大小上是线性的。我们的实现证实了我们的协议在合成和实际数据上的线性时间行为和实际可行性。
{"title":"Secure protocols for cumulative reward maximization in stochastic multi-armed bandits","authors":"Radu Ciucanu, P. Lafourcade, Marius Lombard-Platet, Marta Soare","doi":"10.3233/jcs-210051","DOIUrl":"https://doi.org/10.3233/jcs-210051","url":null,"abstract":"We consider the problem of cumulative reward maximization in multi-armed bandits. We address the security concerns that occur when data and computations are outsourced to an honest-but-curious cloud i.e., that executes tasks dutifully, but tries to gain as much information as possible. We consider situations where data used in bandit algorithms is sensitive and has to be protected e.g., commercial or personal data. We rely on cryptographic schemes and propose UCB - MS, a secure multi-party protocol based on the UCB algorithm. We prove that UCB - MS computes the same cumulative reward as UCB while satisfying desirable security properties. In particular, cloud nodes cannot learn the cumulative reward or the sum of rewards for more than one arm. Moreover, by analyzing messages exchanged among cloud nodes, an external observer cannot learn the cumulative reward or the sum of rewards produced by some arm. We show that the overhead due to cryptographic primitives is linear in the size of the input. Our implementation confirms the linear-time behavior and the practical feasibility of our protocol, on both synthetic and real-world data.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123277883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial examples for network intrusion detection systems 网络入侵检测系统的对抗性示例
Pub Date : 2022-01-31 DOI: 10.3233/jcs-210094
Ryan Sheatsley, Nicolas Papernot, Mike Weisman, Gunjan Verma, P. Mcdaniel
Machine learning-based network intrusion detection systems have demonstrated state-of-the-art accuracy in flagging malicious traffic. However, machine learning has been shown to be vulnerable to adversarial examples, particularly in domains such as image recognition. In many threat models, the adversary exploits the unconstrained nature of images–the adversary is free to select some arbitrary amount of pixels to perturb. However, it is not clear how these attacks translate to domains such as network intrusion detection as they contain domain constraints, which limit which and how features can be modified by the adversary. In this paper, we explore whether the constrained nature of networks offers additional robustness against adversarial examples versus the unconstrained nature of images. We do this by creating two algorithms: (1) the Adapative-JSMA, an augmented version of the popular JSMA which obeys domain constraints, and (2) the Histogram Sketch Generation which generates adversarial sketches: targeted universal perturbation vectors that encode feature saliency within the envelope of domain constraints. To assess how these algorithms perform, we evaluate them in a constrained network intrusion detection setting and an unconstrained image recognition setting. The results show that our approaches generate misclassification rates in network intrusion detection applications that were comparable to those of image recognition applications (greater than 95%). Our investigation shows that the constrained attack surface exposed by network intrusion detection systems is still sufficiently large to craft successful adversarial examples – and thus, network constraints do not appear to add robustness against adversarial examples. Indeed, even if a defender constrains an adversary to as little as five random features, generating adversarial examples is still possible.
基于机器学习的网络入侵检测系统在标记恶意流量方面已经展示了最先进的准确性。然而,机器学习已被证明容易受到对抗性示例的影响,特别是在图像识别等领域。在许多威胁模型中,攻击者利用图像不受约束的特性——攻击者可以自由地选择任意数量的像素进行干扰。然而,目前尚不清楚这些攻击如何转化为网络入侵检测等领域,因为它们包含领域约束,这些约束限制了攻击者可以修改哪些特征以及如何修改特征。在本文中,我们探讨了网络的约束性质是否为对抗示例提供了额外的鲁棒性,而不是图像的无约束性质。我们通过创建两种算法来实现这一点:(1)自适应JSMA,一种受欢迎的JSMA的增强版本,它服从域约束;(2)直方图草图生成,它生成对抗性草图:目标通用扰动向量,在域约束的包膜内编码特征显著性。为了评估这些算法的性能,我们在受限的网络入侵检测设置和无约束的图像识别设置中对它们进行了评估。结果表明,我们的方法在网络入侵检测应用中产生的误分类率与图像识别应用相当(大于95%)。我们的调查表明,网络入侵检测系统暴露的受限攻击面仍然足够大,足以制作成功的对抗性示例——因此,网络约束似乎并没有增加对对抗性示例的鲁棒性。事实上,即使防御者将对手限制在5个随机特征中,生成对抗性示例仍然是可能的。
{"title":"Adversarial examples for network intrusion detection systems","authors":"Ryan Sheatsley, Nicolas Papernot, Mike Weisman, Gunjan Verma, P. Mcdaniel","doi":"10.3233/jcs-210094","DOIUrl":"https://doi.org/10.3233/jcs-210094","url":null,"abstract":"Machine learning-based network intrusion detection systems have demonstrated state-of-the-art accuracy in flagging malicious traffic. However, machine learning has been shown to be vulnerable to adversarial examples, particularly in domains such as image recognition. In many threat models, the adversary exploits the unconstrained nature of images–the adversary is free to select some arbitrary amount of pixels to perturb. However, it is not clear how these attacks translate to domains such as network intrusion detection as they contain domain constraints, which limit which and how features can be modified by the adversary. In this paper, we explore whether the constrained nature of networks offers additional robustness against adversarial examples versus the unconstrained nature of images. We do this by creating two algorithms: (1) the Adapative-JSMA, an augmented version of the popular JSMA which obeys domain constraints, and (2) the Histogram Sketch Generation which generates adversarial sketches: targeted universal perturbation vectors that encode feature saliency within the envelope of domain constraints. To assess how these algorithms perform, we evaluate them in a constrained network intrusion detection setting and an unconstrained image recognition setting. The results show that our approaches generate misclassification rates in network intrusion detection applications that were comparable to those of image recognition applications (greater than 95%). Our investigation shows that the constrained attack surface exposed by network intrusion detection systems is still sufficiently large to craft successful adversarial examples – and thus, network constraints do not appear to add robustness against adversarial examples. Indeed, even if a defender constrains an adversary to as little as five random features, generating adversarial examples is still possible.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Personal data protection in the age of mass surveillance 大规模监控时代的个人数据保护
Pub Date : 2022-01-20 DOI: 10.3233/jcs-200033
Antti Hakkala, J. Koskinen
We present a solution to data ownership in the surveillance age in the form of an ethically sustainable framework for managing personal and person-derived data. This framework is based on the concept of Datenherrschaft – mastery over data that all natural persons should have on data they themselves produce or is derived thereof. We give numerous examples and tie cases to robust ethical analysis, and also discuss technological dimensions.
我们以管理个人和个人衍生数据的道德可持续框架的形式提出了监控时代数据所有权的解决方案。这一框架是基于数据所有权的概念,即所有自然人都应该对他们自己产生或由此产生的数据拥有控制权。我们给出了大量的例子,并将案例与健全的伦理分析联系起来,还讨论了技术层面。
{"title":"Personal data protection in the age of mass surveillance","authors":"Antti Hakkala, J. Koskinen","doi":"10.3233/jcs-200033","DOIUrl":"https://doi.org/10.3233/jcs-200033","url":null,"abstract":"We present a solution to data ownership in the surveillance age in the form of an ethically sustainable framework for managing personal and person-derived data. This framework is based on the concept of Datenherrschaft – mastery over data that all natural persons should have on data they themselves produce or is derived thereof. We give numerous examples and tie cases to robust ethical analysis, and also discuss technological dimensions.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"28 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123583394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue: Security and Cryptography for Networks - SCN 2020 特刊:网络安全与密码学- SCN 2020
Pub Date : 2022-01-11 DOI: 10.3233/jcs-219000
Clemente Galdi, V. Kolesnikov
This special issue includes several papers that have been selected from the program of the 12th Conference on Security and Cryptography for Networks. The conference, originally planned in Amalfi (SA), Italy, was held online on Sept. 14–16, 2020, due to Covid-19. The papers appearing in the present issue have been extended from their original conference versions, and have gone through a second rigorous reviewing process. We briefly review the papers included in this issue: Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE by Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl and Juan Ramón Troncoso-Pastoriza constructs Oblivious Linear Function Evaluation (OLE) protocols from the Ring-LWE problem. OLE has recently been shown to be very useful in practical multiparty computation, and this work proposes lattice-based OLE protocols and analyzes their standalone efficiency. In Double-Authentication-Preventing Signatures in the Standard Model, Dario Catalano, Georg Fuchsbauer and Azam Soleimanian present efficient DAPS schemes that are secure in the standard model and support large address spaces. DAPS is a special type of signature meant to punish the signer if it signs two messages with the same “address.” For example, this may be desired if the signer issues two different certificates for the same domain. The paper Private Identity Agreement for Private Set Functionalities by Benjamin Terner, Benjamin Kreuter and Sarvar Patel explores an interesting twist on private set intersection. If we want to compute a function of the intersection of our data, we need to first “align” our data so that we hold identical identifiers for any records that match. The situation is even more complicated when identifiers are “fuzzy” as in real-world data. In those cases, one party may hold several records corresponding to the same person, but be unaware of this fact. Only when combined with another data set will this fact be evident (if the other data set contains a record that connects with both). This paper proposes a method for two parties to privately assign identifiers to records in this kind of scenario. The main challenge here is the transitive nature of whether two records match. In Fast Threshold ECDSA with Honest Majority, Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter and Michael Bæksvang Østergaard propose a new faster threshold variant of the ECDSA signature scheme.
本特刊收录了从第12届网络安全与密码学会议中精选的几篇论文。该会议原定于2020年9月14日至16日在意大利阿马尔菲(SA)举行,原因是新冠肺炎。本期发表的论文已从原来的会议版本扩充,并经过了第二次严格的审查程序。我们简要回顾了这期中包含的论文:Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl和Juan在Ring-LWE问题上构造的遗忘线性函数评估(Oblivious Linear Function Evaluation, OLE)协议。OLE最近在实际的多方计算中被证明是非常有用的,本工作提出了基于格的OLE协议并分析了它们的独立效率。Dario Catalano、Georg Fuchsbauer和Azam Soleimanian在《标准模型中的防止双重认证签名》中提出了在标准模型中安全且支持大地址空间的高效DAPS方案。DAPS是一种特殊类型的签名,如果签名者用相同的“地址”签署了两条消息,就会受到惩罚。例如,如果签名者为同一域颁发两个不同的证书,这可能是需要的。Benjamin Terner, Benjamin Kreuter和Sarvar Patel的论文Private Identity Agreement for Private Set functions探讨了关于Private Set intersection的一个有趣的转折。如果我们想要计算数据交集的函数,我们需要首先“对齐”我们的数据,以便我们为任何匹配的记录保留相同的标识符。当标识符像真实世界的数据一样“模糊”时,情况就更加复杂了。在这些情况下,一方可能持有与同一人对应的几份记录,但不知道这一事实。只有当与另一个数据集结合时,这个事实才会明显(如果另一个数据集包含与两者连接的记录)。在这种情况下,本文提出了一种双方私下为记录分配标识符的方法。这里的主要挑战是两个记录是否匹配的传递性。在Fast Threshold ECDSA with Honest Majority中,Ivan damg、Thomas P. Jakobsen、Jesper Buus Nielsen、Jakob Illeborg Pagter和Michael Bæksvang Østergaard提出了一种新的更快的ECDSA签名方案的阈值变体。
{"title":"Special issue: Security and Cryptography for Networks - SCN 2020","authors":"Clemente Galdi, V. Kolesnikov","doi":"10.3233/jcs-219000","DOIUrl":"https://doi.org/10.3233/jcs-219000","url":null,"abstract":"This special issue includes several papers that have been selected from the program of the 12th Conference on Security and Cryptography for Networks. The conference, originally planned in Amalfi (SA), Italy, was held online on Sept. 14–16, 2020, due to Covid-19. The papers appearing in the present issue have been extended from their original conference versions, and have gone through a second rigorous reviewing process. We briefly review the papers included in this issue: Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE by Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl and Juan Ramón Troncoso-Pastoriza constructs Oblivious Linear Function Evaluation (OLE) protocols from the Ring-LWE problem. OLE has recently been shown to be very useful in practical multiparty computation, and this work proposes lattice-based OLE protocols and analyzes their standalone efficiency. In Double-Authentication-Preventing Signatures in the Standard Model, Dario Catalano, Georg Fuchsbauer and Azam Soleimanian present efficient DAPS schemes that are secure in the standard model and support large address spaces. DAPS is a special type of signature meant to punish the signer if it signs two messages with the same “address.” For example, this may be desired if the signer issues two different certificates for the same domain. The paper Private Identity Agreement for Private Set Functionalities by Benjamin Terner, Benjamin Kreuter and Sarvar Patel explores an interesting twist on private set intersection. If we want to compute a function of the intersection of our data, we need to first “align” our data so that we hold identical identifiers for any records that match. The situation is even more complicated when identifiers are “fuzzy” as in real-world data. In those cases, one party may hold several records corresponding to the same person, but be unaware of this fact. Only when combined with another data set will this fact be evident (if the other data set contains a record that connects with both). This paper proposes a method for two parties to privately assign identifiers to records in this kind of scenario. The main challenge here is the transitive nature of whether two records match. In Fast Threshold ECDSA with Honest Majority, Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter and Michael Bæksvang Østergaard propose a new faster threshold variant of the ECDSA signature scheme.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133214006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Private Identity Agreement for Private Set Functionalities 私有集功能的私有身份协议
Pub Date : 2021-12-01 DOI: 10.1007/978-3-030-57990-6_9
Ben Kreuter, Sarvar Patel, Ben Terner
{"title":"Private Identity Agreement for Private Set Functionalities","authors":"Ben Kreuter, Sarvar Patel, Ben Terner","doi":"10.1007/978-3-030-57990-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_9","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the feasibility of crawling-based attacks against recommender systems 基于爬虫攻击推荐系统的可行性研究
Pub Date : 2021-11-04 DOI: 10.3233/jcs-210041
F. Aiolli, M. Conti, S. Picek, Mirko Polato
Nowadays, online services, like e-commerce or streaming services, provide a personalized user experience through recommender systems. Recommender systems are built upon a vast amount of data about users/items acquired by the services. Such knowledge represents an invaluable resource. However, commonly, part of this knowledge is public and can be easily accessed via the Internet. Unfortunately, that same knowledge can be leveraged by competitors or malicious users. The literature offers a large number of works concerning attacks on recommender systems, but most of them assume that the attacker can easily access the full rating matrix. In practice, this is never the case. The only way to access the rating matrix is by gathering the ratings (e.g., reviews) by crawling the service’s website. Crawling a website has a cost in terms of time and resources. What is more, the targeted website can employ defensive measures to detect automatic scraping. In this paper, we assess the impact of a series of attacks on recommender systems. Our analysis aims to set up the most realistic scenarios considering both the possibilities and the potential attacker’s limitations. In particular, we assess the impact of different crawling approaches when attacking a recommendation service. From the collected information, we mount various profile injection attacks. We measure the value of the collected knowledge through the identification of the most similar user/item. Our empirical results show that while crawling can indeed bring knowledge to the attacker (up to 65% of neighborhood reconstruction on a mid-size dataset and up to 90% on a small-size dataset), this will not be enough to mount a successful shilling attack in practice.
如今,在线服务,如电子商务或流媒体服务,通过推荐系统提供个性化的用户体验。推荐系统建立在服务获取的大量用户/项目数据的基础上。这种知识是一种无价的资源。然而,通常,这些知识的一部分是公开的,可以很容易地通过Internet访问。不幸的是,同样的知识可以被竞争对手或恶意用户利用。文献提供了大量关于攻击推荐系统的工作,但其中大多数假设攻击者可以轻松访问完整的评级矩阵。在实践中,情况并非如此。访问评级矩阵的唯一方法是通过抓取服务网站来收集评级(例如,评论)。抓取网站需要花费时间和资源。更重要的是,目标网站可以采用防御措施来检测自动抓取。在本文中,我们评估了一系列攻击对推荐系统的影响。我们的分析旨在考虑可能性和潜在攻击者的限制,建立最现实的场景。特别是,我们在攻击推荐服务时评估了不同爬行方法的影响。根据收集到的信息,我们发动了各种配置文件注入攻击。我们通过识别最相似的用户/项目来衡量收集到的知识的价值。我们的经验结果表明,虽然爬行确实可以为攻击者带来知识(在中等规模的数据集上高达65%的邻域重建,在小型数据集上高达90%),但这还不足以在实践中成功地发动一场攻击。
{"title":"On the feasibility of crawling-based attacks against recommender systems","authors":"F. Aiolli, M. Conti, S. Picek, Mirko Polato","doi":"10.3233/jcs-210041","DOIUrl":"https://doi.org/10.3233/jcs-210041","url":null,"abstract":"Nowadays, online services, like e-commerce or streaming services, provide a personalized user experience through recommender systems. Recommender systems are built upon a vast amount of data about users/items acquired by the services. Such knowledge represents an invaluable resource. However, commonly, part of this knowledge is public and can be easily accessed via the Internet. Unfortunately, that same knowledge can be leveraged by competitors or malicious users. The literature offers a large number of works concerning attacks on recommender systems, but most of them assume that the attacker can easily access the full rating matrix. In practice, this is never the case. The only way to access the rating matrix is by gathering the ratings (e.g., reviews) by crawling the service’s website. Crawling a website has a cost in terms of time and resources. What is more, the targeted website can employ defensive measures to detect automatic scraping. In this paper, we assess the impact of a series of attacks on recommender systems. Our analysis aims to set up the most realistic scenarios considering both the possibilities and the potential attacker’s limitations. In particular, we assess the impact of different crawling approaches when attacking a recommendation service. From the collected information, we mount various profile injection attacks. We measure the value of the collected knowledge through the identification of the most similar user/item. Our empirical results show that while crawling can indeed bring knowledge to the attacker (up to 65% of neighborhood reconstruction on a mid-size dataset and up to 90% on a small-size dataset), this will not be enough to mount a successful shilling attack in practice.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
J. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1