首页 > 最新文献

2009 30th IEEE Symposium on Security and Privacy最新文献

英文 中文
Quantifying Information Leaks in Outbound Web Traffic 量化出站Web流量中的信息泄漏
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.9
Kevin Borders, A. Prakash
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’s network traffic is so voluminous that manual inspection would be unreasonably expensive. In response, researchers have created data loss prevention systems that check outgoing traffic for known confidential information. These systems stop naïve adversaries from leaking data, but are fundamentally unable to identify encrypted or obfuscated information leaks. What remains is a high-capacity pipe for tunneling data to the Internet. We present an approach for quantifying information leak capacity in network traffic. Instead of trying to detect the presence of sensitive data—an impossible task in the general case--our goal is to measure and constrain its maximum volume. We take advantage of the insight that most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, we can isolate and quantify true information flowing from a computer. In this paper, we present measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.
随着Internet的发展和网络带宽的不断增加,管理员面临着防止机密信息离开其网络的任务。今天的网络流量是如此庞大,人工检查将是不合理的昂贵。作为回应,研究人员创建了数据丢失预防系统,用于检查传出流量中已知的机密信息。这些系统阻止naïve攻击者泄漏数据,但从根本上无法识别加密或混淆的信息泄漏。剩下的是一个大容量的管道,用于将数据传输到互联网。提出了一种量化网络流量中信息泄漏容量的方法。我们的目标不是试图检测敏感数据的存在(这在一般情况下是不可能完成的任务),而是测量和限制其最大容量。我们充分认识到,大多数网络流量是重复的,或者是由外部信息决定的,比如协议规范或服务器发送的消息。通过过滤这些数据,我们可以隔离和量化从计算机流出的真实信息。在本文中,我们提出了超文本传输协议(HTTP)的测量算法,HTTP是网页浏览的主要协议。当应用于真实的网页浏览流量时,该算法能够对98.5%的测量字节进行折扣,并有效地隔离信息泄漏。
{"title":"Quantifying Information Leaks in Outbound Web Traffic","authors":"Kevin Borders, A. Prakash","doi":"10.1109/SP.2009.9","DOIUrl":"https://doi.org/10.1109/SP.2009.9","url":null,"abstract":"As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’s network traffic is so voluminous that manual inspection would be unreasonably expensive. In response, researchers have created data loss prevention systems that check outgoing traffic for known confidential information. These systems stop naïve adversaries from leaking data, but are fundamentally unable to identify encrypted or obfuscated information leaks. What remains is a high-capacity pipe for tunneling data to the Internet. We present an approach for quantifying information leak capacity in network traffic. Instead of trying to detect the presence of sensitive data—an impossible task in the general case--our goal is to measure and constrain its maximum volume. We take advantage of the insight that most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, we can isolate and quantify true information flowing from a computer. In this paper, we present measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121800330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers 蓝图:针对现有浏览器的跨站点脚本攻击的健壮预防
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.33
M. Louw, V. Venkatakrishnan
As social networking sites proliferate across the World Wide Web, complex user-created HTML content is rapidly becoming the norm rather than the exception. User-created web content is a notorious vector for cross-site scripting (XSS) attacks that target websites and confidential user data. In this threat climate, mechanisms that render web applications immune to XSS attacks have been of recent research interest.A challenge for these security mechanisms is enabling web applications to accept complex HTML input from users, while disallowing malicious script content. This challenge is made difficult by anomalous web browser behaviors, which are often used as vectors for successful XSS attacks.Motivated by this problem, we present a new XSS defense strategy designed to be effective in widely deployed existing web browsers, despite anomalous browser behavior. Our approach seeks to minimize trust placed on browsers for interpreting untrusted content. We implemented this approach in a tool called Blueprint that was integrated with several popular web applications. We evaluated Blueprint against a barrage of stress tests that demonstrate strong resistance to attacks, excellent compatibility with web browsers and reasonable performance overheads.
随着社交网站在万维网上的激增,复杂的用户创建的HTML内容正迅速成为常态,而不是例外。用户创建的web内容是针对网站和机密用户数据的跨站点脚本(XSS)攻击的臭名昭著的载体。在这种威胁环境下,使web应用程序免受XSS攻击的机制最近引起了人们的研究兴趣。这些安全机制面临的一个挑战是使web应用程序能够接受来自用户的复杂HTML输入,同时不允许恶意脚本内容。异常的web浏览器行为使这种挑战变得困难,这些行为通常被用作成功的跨站攻击的载体。受此问题的启发,我们提出了一种新的XSS防御策略,旨在有效地在广泛部署的现有web浏览器中,尽管浏览器行为异常。我们的方法是尽量减少浏览器对不可信内容的信任。我们在一个名为Blueprint的工具中实现了这种方法,该工具与几个流行的web应用程序集成在一起。我们针对一系列压力测试对Blueprint进行了评估,结果显示Blueprint具有很强的抗攻击能力、与web浏览器的出色兼容性以及合理的性能开销。
{"title":"Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers","authors":"M. Louw, V. Venkatakrishnan","doi":"10.1109/SP.2009.33","DOIUrl":"https://doi.org/10.1109/SP.2009.33","url":null,"abstract":"As social networking sites proliferate across the World Wide Web, complex user-created HTML content is rapidly becoming the norm rather than the exception. User-created web content is a notorious vector for cross-site scripting (XSS) attacks that target websites and confidential user data. In this threat climate, mechanisms that render web applications immune to XSS attacks have been of recent research interest.A challenge for these security mechanisms is enabling web applications to accept complex HTML input from users, while disallowing malicious script content. This challenge is made difficult by anomalous web browser behaviors, which are often used as vectors for successful XSS attacks.Motivated by this problem, we present a new XSS defense strategy designed to be effective in widely deployed existing web browsers, despite anomalous browser behavior. Our approach seeks to minimize trust placed on browsers for interpreting untrusted content. We implemented this approach in a tool called Blueprint that was integrated with several popular web applications. We evaluated Blueprint against a barrage of stress tests that demonstrate strong resistance to attacks, excellent compatibility with web browsers and reasonable performance overheads.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116769128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 232
Tempest in a Teapot: Compromising Reflections Revisited 茶壶里的暴风雨:重新审视妥协的反思
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.20
M. Backes, Tongbo Chen, Markus Dürmuth, H. Lensch, M. Welk
Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user's shirt, can be used to spy on confidential data displayed on a monitor. First, we show how reflections in the user's eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be reconstructed from the diffuse reflections on a wall or the user's clothes, and provide information-theoretic bounds limiting this type of attack. Third, we evaluate the effectiveness of several countermeasures. This substantially improves previous work (Backes et al., IEEE Symposium on Security & Privacy, 2008).
反射诸如茶壶和玻璃杯之类的物体,以及漫反射诸如用户的衬衫之类的物体,可以用来监视显示在监视器上的机密数据。首先,我们展示了如何利用用户眼睛中的反射来监视机密数据。其次,我们研究了监控图像在多大程度上可以从墙上或用户衣服上的漫反射重建,并提供了限制这种攻击的信息论界限。第三,我们评估了几种对策的有效性。这大大改进了以前的工作(Backes等人,IEEE安全和隐私研讨会,2008年)。
{"title":"Tempest in a Teapot: Compromising Reflections Revisited","authors":"M. Backes, Tongbo Chen, Markus Dürmuth, H. Lensch, M. Welk","doi":"10.1109/SP.2009.20","DOIUrl":"https://doi.org/10.1109/SP.2009.20","url":null,"abstract":"Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user's shirt, can be used to spy on confidential data displayed on a monitor. First, we show how reflections in the user's eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be reconstructed from the diffuse reflections on a wall or the user's clothes, and provide information-theoretic bounds limiting this type of attack. Third, we evaluate the effectiveness of several countermeasures. This substantially improves previous work (Backes et al., IEEE Symposium on Security & Privacy, 2008).","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
A Logic of Secure Systems and its Application to Trusted Computing 安全系统逻辑及其在可信计算中的应用
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.16
Anupam Datta, Jason Franklin, D. Garg, D. Kaynar
We present a logic for reasoning about properties of securesystems. The logic is built around a concurrent programminglanguage with constructs for modeling machines with sharedmemory, a simple form of access control on memory, machineresets, cryptographic operations, network communication, anddynamically loading and executing unknown(and potentially untrusted) code. The adversary's capabilities are constrained by the system interface as defined in the programming model (leading to the name csi). We develop a sound proof system for reasoning about programs without explicitly reasoning about adversary actions. We use the logic to characterize trusted computing primitives and prove code integrity and execution integrity properties of two remote attestation protocols. The proofs make precise assumptions needed for the security of these protocols and reveal an insecure interaction between the two protocols.
我们提出了一个关于安全系统属性的推理逻辑。逻辑是围绕一个并发编程语言构建的,该语言的结构包括对机器进行建模,使用共享内存、内存访问控制的简单形式、机器设置、加密操作、网络通信以及动态加载和执行未知(可能不受信任)的代码。攻击者的能力受到编程模型中定义的系统接口的约束(因此得名csi)。我们开发了一个健全的证明系统,可以在不明确推理对手行为的情况下对程序进行推理。我们使用该逻辑来描述可信计算原语,并证明两种远程认证协议的代码完整性和执行完整性属性。这些证明对这些协议的安全性做出了精确的假设,并揭示了两个协议之间的不安全交互。
{"title":"A Logic of Secure Systems and its Application to Trusted Computing","authors":"Anupam Datta, Jason Franklin, D. Garg, D. Kaynar","doi":"10.1109/SP.2009.16","DOIUrl":"https://doi.org/10.1109/SP.2009.16","url":null,"abstract":"We present a logic for reasoning about properties of securesystems. The logic is built around a concurrent programminglanguage with constructs for modeling machines with sharedmemory, a simple form of access control on memory, machineresets, cryptographic operations, network communication, anddynamically loading and executing unknown(and potentially untrusted) code. The adversary's capabilities are constrained by the system interface as defined in the programming model (leading to the name csi). We develop a sound proof system for reasoning about programs without explicitly reasoning about adversary actions. We use the logic to characterize trusted computing primitives and prove code integrity and execution integrity properties of two remote attestation protocols. The proofs make precise assumptions needed for the security of these protocols and reveal an insecure interaction between the two protocols.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114389952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
Password Cracking Using Probabilistic Context-Free Grammars 使用概率上下文无关语法的密码破解
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.8
M. Weir, S. Aggarwal, B. D. Medeiros, Bill Glodek
Choosing the most effective word-mangling rules to use when performing a dictionary-based password cracking attack can be a difficult task. In this paper we discuss a new method that generates password structures in highest probability order. We first automatically create a probabilistic context-free grammar based upon a training set of previously disclosed passwords. This grammar then allows us to generate word-mangling rules, and from them, password guesses to be used in password cracking. We will also show that this approach seems to provide a more effective way to crack passwords as compared to traditional methods by testing our tools and techniques on real password sets. In one series of experiments, training on a set of disclosed passwords, our approach was able to crack 28% to 129% more passwords than John the Ripper, a publicly available standard password cracking program.
在执行基于字典的密码破解攻击时,选择最有效的单词篡改规则可能是一项艰巨的任务。本文讨论了一种以最高概率顺序生成密码结构的新方法。我们首先基于先前公开的密码训练集自动创建一个概率上下文无关语法。然后,该语法允许我们生成单词混淆规则,并根据这些规则进行密码猜测,以用于密码破解。我们还将通过在真实密码集上测试我们的工具和技术来证明,与传统方法相比,这种方法似乎提供了一种更有效的破解密码的方法。在对一组公开密码进行训练的一系列实验中,我们的方法破解的密码比开膛手约翰(John the Ripper)多28%到129%。开膛手是一个公开的标准密码破解程序。
{"title":"Password Cracking Using Probabilistic Context-Free Grammars","authors":"M. Weir, S. Aggarwal, B. D. Medeiros, Bill Glodek","doi":"10.1109/SP.2009.8","DOIUrl":"https://doi.org/10.1109/SP.2009.8","url":null,"abstract":"Choosing the most effective word-mangling rules to use when performing a dictionary-based password cracking attack can be a difficult task. In this paper we discuss a new method that generates password structures in highest probability order. We first automatically create a probabilistic context-free grammar based upon a training set of previously disclosed passwords. This grammar then allows us to generate word-mangling rules, and from them, password guesses to be used in password cracking. We will also show that this approach seems to provide a more effective way to crack passwords as compared to traditional methods by testing our tools and techniques on real password sets. In one series of experiments, training on a set of disclosed passwords, our approach was able to crack 28% to 129% more passwords than John the Ripper, a publicly available standard password cracking program.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116495382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 489
Sphinx: A Compact and Provably Secure Mix Format Sphinx:一种紧凑且可证明安全的混合格式
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.15
G. Danezis, I. Goldberg
Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security features: indistinguishable replies, hiding the path length and relay position, as well as providing unlinkability for each leg of the message's journey over the network. We prove the full cryptographic security of Sphinx in the random oracle model, and we describe how it can be used as an efficient drop-in replacement in deployed remailer systems.
Sphinx是一种加密消息格式,用于在混合网络中中继匿名消息。它比任何类似的方案都要紧凑,并且支持一整套安全特性:不可区分的应答、隐藏路径长度和中继位置,以及为消息在网络上的每一段提供不可链接性。我们在随机oracle模型中证明了Sphinx的完全加密安全性,并描述了它如何在已部署的服务器系统中作为有效的替代方案使用。
{"title":"Sphinx: A Compact and Provably Secure Mix Format","authors":"G. Danezis, I. Goldberg","doi":"10.1109/SP.2009.15","DOIUrl":"https://doi.org/10.1109/SP.2009.15","url":null,"abstract":"Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security features: indistinguishable replies, hiding the path length and relay position, as well as providing unlinkability for each leg of the message's journey over the network. We prove the full cryptographic security of Sphinx in the random oracle model, and we describe how it can be used as an efficient drop-in replacement in deployed remailer systems.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126317085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
DSybil: Optimal Sybil-Resistance for Recommendation Systems DSybil:推荐系统的最佳Sybil-Resistance
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.26
Haifeng Yu, Chenwei Shi, M. Kaminsky, Phillip B. Gibbons, Feng Xiao
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a {em sybil attack}, where the attacker creates a potentially unlimited number of {em sybil identities} to vote. Defending against sybil attacks is often quite challenging, and the nature of recommendation systems makes it even harder. This paper presents {em DSybil}, a novel defense for diminishing the influence of sybil identities in recommendation systems. DSybil provides strong provable guarantees that hold even under the worst-case attack and are optimal. DSybil can defend against an unlimited number of sybil identities over time. DSybil achieves its strong guarantees by i) exploiting the heavy-tail distribution of the typical voting behavior of the honest identities, and ii) carefully identifying whether the system is already getting ``enough help'' from the (weighted) voters already taken into account or whether more ``help'' is needed. Our evaluation shows that DSybil would continue to provide high-quality recommendations even when a million-node botnet uses an optimal strategy to launch a sybil attack.
推荐系统可以通过各种方式受到攻击,最终的攻击形式是{em sybil攻击},攻击者可以创建无限数量的{em sybil身份}进行投票。防御sybil攻击通常是相当具有挑战性的,而推荐系统的性质使其更加困难。本文提出了{em DSybil},一种在推荐系统中减少sybil身份影响的新防御方法。DSybil提供了强大的可证明的保证,即使在最坏的攻击下也是最优的。随着时间的推移,DSybil可以防御无限数量的sybil身份。DSybil通过i)利用诚实身份的典型投票行为的重尾分布,ii)仔细识别系统是否已经从已经考虑的(加权)选民那里获得了“足够的帮助”,或者是否需要更多的“帮助”来实现其强大的保证。我们的评估表明,即使百万节点僵尸网络使用最佳策略发起sybil攻击,DSybil仍将继续提供高质量的推荐。
{"title":"DSybil: Optimal Sybil-Resistance for Recommendation Systems","authors":"Haifeng Yu, Chenwei Shi, M. Kaminsky, Phillip B. Gibbons, Feng Xiao","doi":"10.1109/SP.2009.26","DOIUrl":"https://doi.org/10.1109/SP.2009.26","url":null,"abstract":"Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a {em sybil attack}, where the attacker creates a potentially unlimited number of {em sybil identities} to vote. Defending against sybil attacks is often quite challenging, and the nature of recommendation systems makes it even harder. This paper presents {em DSybil}, a novel defense for diminishing the influence of sybil identities in recommendation systems. DSybil provides strong provable guarantees that hold even under the worst-case attack and are optimal. DSybil can defend against an unlimited number of sybil identities over time. DSybil achieves its strong guarantees by i) exploiting the heavy-tail distribution of the typical voting behavior of the honest identities, and ii) carefully identifying whether the system is already getting ``enough help'' from the (weighted) voters already taken into account or whether more ``help'' is needed. Our evaluation shows that DSybil would continue to provide high-quality recommendations even when a million-node botnet uses an optimal strategy to launch a sybil attack.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133034514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
Prospex: Protocol Specification Extraction Prospex:协议规范提取
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.14
P. M. Comparetti, Gilbert Wondracek, Christopher Krügel, E. Kirda
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very useful in a number of security-related contexts, for example, to perform deep packet inspection and black-box fuzzing, or to quickly understand custom botnet command and control (C&C) channels.Since manual reverse engineering is a time-consuming and tedious process, a number of systems have been proposed that aim to automate this task. These systems either analyze network traffic directly or monitor the execution of the application that receives the protocol messages. While previous systems show that precise message formats can be extracted automatically, they do not provide a protocol specification.The reason is that they do not reverse engineer the protocol state machine.In this paper, we focus on closing this gap by presenting a system that is capable of automatically inferring state machines. This greatly enhances the results of automatic protocol reverse engineering, while further reducing the need for human interaction. We extend previous work that focuses on behavior-based message format extraction,and introduce techniques for identifying and clustering different types of messages not only based on their structure, but also according to the impact of each message on server behavior.Moreover, we present an algorithm for extracting the state machine.We have applied our techniques to a number of real-world protocols, including the command and control protocol used by a malicious bot. Our results demonstrate that we are able to extract format specifications for different types of messages and meaningful protocol state machines. We use these protocol specifications to automatically generate input for a stateful fuzzer,allowing us to discover security vulnerabilities in real-world applications.
协议逆向工程是提取网络协议的应用层规范的过程。这些规范在许多与安全相关的上下文中非常有用,例如,执行深度数据包检测和黑盒模糊测试,或快速理解自定义僵尸网络命令和控制(C&C)通道。由于手动逆向工程是一个耗时且乏味的过程,因此已经提出了许多旨在自动化此任务的系统。这些系统要么直接分析网络流量,要么监视接收协议消息的应用程序的执行情况。虽然以前的系统表明可以自动提取精确的消息格式,但它们没有提供协议规范。原因是它们没有对协议状态机进行逆向工程。在本文中,我们通过提出一个能够自动推断状态机的系统来缩小这一差距。这大大提高了自动协议逆向工程的效果,同时进一步减少了对人工交互的需要。我们扩展了先前关注基于行为的消息格式提取的工作,并引入了不仅基于其结构,而且根据每个消息对服务器行为的影响来识别和聚类不同类型消息的技术。此外,我们还提出了一种提取状态机的算法。我们已经将我们的技术应用于许多现实世界的协议,包括恶意机器人使用的命令和控制协议。我们的结果表明,我们能够为不同类型的消息和有意义的协议状态机提取格式规范。我们使用这些协议规范为有状态模糊器自动生成输入,允许我们发现真实应用程序中的安全漏洞。
{"title":"Prospex: Protocol Specification Extraction","authors":"P. M. Comparetti, Gilbert Wondracek, Christopher Krügel, E. Kirda","doi":"10.1109/SP.2009.14","DOIUrl":"https://doi.org/10.1109/SP.2009.14","url":null,"abstract":"Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very useful in a number of security-related contexts, for example, to perform deep packet inspection and black-box fuzzing, or to quickly understand custom botnet command and control (C&C) channels.Since manual reverse engineering is a time-consuming and tedious process, a number of systems have been proposed that aim to automate this task. These systems either analyze network traffic directly or monitor the execution of the application that receives the protocol messages. While previous systems show that precise message formats can be extracted automatically, they do not provide a protocol specification.The reason is that they do not reverse engineer the protocol state machine.In this paper, we focus on closing this gap by presenting a system that is capable of automatically inferring state machines. This greatly enhances the results of automatic protocol reverse engineering, while further reducing the need for human interaction. We extend previous work that focuses on behavior-based message format extraction,and introduce techniques for identifying and clustering different types of messages not only based on their structure, but also according to the impact of each message on server behavior.Moreover, we present an algorithm for extracting the state machine.We have applied our techniques to a number of real-world protocols, including the command and control protocol used by a malicious bot. Our results demonstrate that we are able to extract format specifications for different types of messages and meaningful protocol state machines. We use these protocol specifications to automatically generate input for a stateful fuzzer,allowing us to discover security vulnerabilities in real-world applications.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126917671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 284
Automatic Reverse Engineering of Malware Emulators 恶意软件仿真器的自动逆向工程
Pub Date : 2009-05-17 DOI: 10.1109/SP.2009.27
Monirul I. Sharif, A. Lanzi, Jonathon T. Giffin, Wenke Lee
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated instruction set and paired with a native binary emulator that interprets the bytecode. No existing malware analysis can reliably reverse this obfuscation technique. In this paper, we present the first work in automatic reverse engineering of malware emulators. Our algorithms are based on dynamic analysis. We execute the emulated malware in a protected environment and record the entire x86 instruction trace generated by the emulator. We then use dynamic data-flow and taint analysis over the trace to identify data buffers containing the bytecode program and extract the syntactic and semantic information about the bytecode instruction set. With these analysis outputs, we are able to generate data structures, such as control-flow graphs, that provide the foundation for subsequent malware analysis. We implemented a proof-of-concept system called Rotalume and evaluated it using both legitimate programs and malware emulated by VMProtect and Code Virtualizer. The results show that Rotalume accurately reveals the syntax and semantics of emulated instruction sets and reconstructs execution paths of original programs from their bytecode representations.
恶意软件作者最近开始使用仿真技术来混淆他们的代码。它们将本地恶意软件二进制文件转换成用随机生成的指令集编写的字节码程序,并与解释字节码的本地二进制仿真器配对。没有现有的恶意软件分析可以可靠地逆转这种混淆技术。在本文中,我们提出了恶意软件仿真器自动逆向工程的第一个工作。我们的算法是基于动态分析的。我们在受保护的环境中执行仿真的恶意软件,并记录仿真器生成的整个x86指令跟踪。然后,我们在跟踪中使用动态数据流和污点分析来识别包含字节码程序的数据缓冲区,并提取有关字节码指令集的语法和语义信息。有了这些分析输出,我们就能够生成数据结构,比如控制流图,为后续的恶意软件分析提供基础。我们实现了一个名为Rotalume的概念验证系统,并使用VMProtect和Code Virtualizer模拟的合法程序和恶意软件对其进行了评估。结果表明,Rotalume能够准确地揭示仿真指令集的语法和语义,并根据原始程序的字节码表示重构原始程序的执行路径。
{"title":"Automatic Reverse Engineering of Malware Emulators","authors":"Monirul I. Sharif, A. Lanzi, Jonathon T. Giffin, Wenke Lee","doi":"10.1109/SP.2009.27","DOIUrl":"https://doi.org/10.1109/SP.2009.27","url":null,"abstract":"Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated instruction set and paired with a native binary emulator that interprets the bytecode. No existing malware analysis can reliably reverse this obfuscation technique. In this paper, we present the first work in automatic reverse engineering of malware emulators. Our algorithms are based on dynamic analysis. We execute the emulated malware in a protected environment and record the entire x86 instruction trace generated by the emulator. We then use dynamic data-flow and taint analysis over the trace to identify data buffers containing the bytecode program and extract the syntactic and semantic information about the bytecode instruction set. With these analysis outputs, we are able to generate data structures, such as control-flow graphs, that provide the foundation for subsequent malware analysis. We implemented a proof-of-concept system called Rotalume and evaluated it using both legitimate programs and malware emulated by VMProtect and Code Virtualizer. The results show that Rotalume accurately reveals the syntax and semantics of emulated instruction sets and reconstructs execution paths of original programs from their bytecode representations.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116755887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 210
The Mastermind Attack on Genomic Data 对基因组数据的攻击
Pub Date : 2009-04-28 DOI: 10.1109/SP.2009.4
M. Goodrich
In this paper, we study the degree to which a genomic string, $Q$,leaks details about itself any time it engages in comparison protocolswith a genomic querier, Bob, even if those protocols arecryptographically guaranteed to produce no additional information otherthan the scores that assess the degree to which $Q$ matches stringsoffered by Bob. We show that such scenarios allow Bob to play variantsof the game of Mastermind with $Q$ so as to learn the complete identityof $Q$. We show that there are a number of efficient implementationsfor Bob to employ in these Mastermind attacks, depending on knowledgehe has about the structure of $Q$, which show how quickly he candetermine $Q$. Indeed, we show that Bob can discover $Q$ using anumber of rounds of test comparisons that is much smaller than thelength of $Q$, under various assumptions regarding the types of scoresthat are returned by the cryptographic protocols and whether he can useknowledge about the distribution that $Q$ comes from, e.g., usingpublic knowledge about the properties of human DNA. We also providethe results of an experimental study we performed on a database ofmitochondrial DNA, showing the vulnerability of existing real-world DNAdata to the Mastermind attack.
在本文中,我们研究了基因组字符串$Q$在与基因组查询器Bob进行比较协议时泄露其自身细节的程度,即使这些协议在密码学上保证除了评估$Q$与Bob提供的字符串匹配程度的分数之外不会产生任何其他信息。我们展示了这样的场景允许Bob与$Q$玩各种各样的游戏,从而学习$Q$的完整身份。我们展示了Bob可以在这些Mastermind攻击中使用许多有效的实现,这取决于他对$Q$结构的了解,这表明他可以多快地确定$Q$。事实上,我们表明Bob可以使用比Q$长度小得多的测试比较的轮数来发现Q$,在关于加密协议返回的分数类型的各种假设下,以及他是否可以使用关于Q$来自的分布的知识,例如,使用关于人类DNA属性的公共知识。我们还提供了我们在线粒体DNA数据库上进行的一项实验研究的结果,显示了现有的真实世界DNA数据在Mastermind攻击下的脆弱性。
{"title":"The Mastermind Attack on Genomic Data","authors":"M. Goodrich","doi":"10.1109/SP.2009.4","DOIUrl":"https://doi.org/10.1109/SP.2009.4","url":null,"abstract":"In this paper, we study the degree to which a genomic string, $Q$,leaks details about itself any time it engages in comparison protocolswith a genomic querier, Bob, even if those protocols arecryptographically guaranteed to produce no additional information otherthan the scores that assess the degree to which $Q$ matches stringsoffered by Bob. We show that such scenarios allow Bob to play variantsof the game of Mastermind with $Q$ so as to learn the complete identityof $Q$. We show that there are a number of efficient implementationsfor Bob to employ in these Mastermind attacks, depending on knowledgehe has about the structure of $Q$, which show how quickly he candetermine $Q$. Indeed, we show that Bob can discover $Q$ using anumber of rounds of test comparisons that is much smaller than thelength of $Q$, under various assumptions regarding the types of scoresthat are returned by the cryptographic protocols and whether he can useknowledge about the distribution that $Q$ comes from, e.g., usingpublic knowledge about the properties of human DNA. We also providethe results of an experimental study we performed on a database ofmitochondrial DNA, showing the vulnerability of existing real-world DNAdata to the Mastermind attack.","PeriodicalId":161757,"journal":{"name":"2009 30th IEEE Symposium on Security and Privacy","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
期刊
2009 30th IEEE Symposium on Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1