首页 > 最新文献

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security最新文献

英文 中文
Attacks and Defence on Android Free Floating Windows Android自由浮动窗口的攻击与防御
Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, D. Feng
Nowadays, the popular Android is so closely involved in people's daily lives that people rely on Android to perform critical operations and trust Android with sensitive information. It is of great importance to guarantee the usability and security of Android which, however, is such a huge system that a potential threat may arise from any part of it. In this paper, we focus on the Free Floating window (FF window) which is a category of windows that can appear freely above any other applications. It can share the screen space with other FF windows, dialogs, and activities. An FF window is flexible in both its appearance and behaviour features. We analyse the behaviour features of FF windows, including the priority in display layer and the capability of processing user-generated events. Three types of attacks via FF windows with delicate design in their appearance and behaviour features are demonstrated, i.e., DoS attack against Android system, GUI hijacking by targeting overlap, and input inference using FF windows as a side channel. To address the threat caused by FF windows, we design a priority framework for FF windows, which protects a sensitive activity/FF window declared by developers from being attacked by any malicious FF windows. A complementary solution is proposed to mitigate the confusion attack from malicious activities. Finally, we provide Android with suggestions on how to manage FF windows.
如今,流行的Android与人们的日常生活密切相关,人们依赖Android来执行关键操作,将敏感信息托付给Android。保证Android的可用性和安全性是非常重要的,然而,Android是一个庞大的系统,它的任何一个部分都可能产生潜在的威胁。在本文中,我们关注的是自由浮动窗口(FF窗口),这是一类可以自由出现在任何其他应用程序之上的窗口。它可以与其他FF窗口、对话框和活动共享屏幕空间。FF窗口在外观和行为特征上都是灵活的。我们分析了FF窗口的行为特征,包括显示层的优先级和处理用户生成事件的能力。本文展示了三种通过外观和行为特征设计精美的FF窗口进行攻击的方法,即针对Android系统的DoS攻击、针对重叠的GUI劫持以及利用FF窗口作为侧信道进行输入推理。为了解决FF窗口带来的威胁,我们为FF窗口设计了一个优先级框架,该框架保护开发人员声明的敏感活动/FF窗口免受任何恶意FF窗口的攻击。针对恶意活动的混淆攻击,提出了一种补充解决方案。最后,我们为Android提供了如何管理FF窗口的建议。
{"title":"Attacks and Defence on Android Free Floating Windows","authors":"Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, D. Feng","doi":"10.1145/2897845.2897897","DOIUrl":"https://doi.org/10.1145/2897845.2897897","url":null,"abstract":"Nowadays, the popular Android is so closely involved in people's daily lives that people rely on Android to perform critical operations and trust Android with sensitive information. It is of great importance to guarantee the usability and security of Android which, however, is such a huge system that a potential threat may arise from any part of it. In this paper, we focus on the Free Floating window (FF window) which is a category of windows that can appear freely above any other applications. It can share the screen space with other FF windows, dialogs, and activities. An FF window is flexible in both its appearance and behaviour features. We analyse the behaviour features of FF windows, including the priority in display layer and the capability of processing user-generated events. Three types of attacks via FF windows with delicate design in their appearance and behaviour features are demonstrated, i.e., DoS attack against Android system, GUI hijacking by targeting overlap, and input inference using FF windows as a side channel. To address the threat caused by FF windows, we design a priority framework for FF windows, which protects a sensitive activity/FF window declared by developers from being attacked by any malicious FF windows. A complementary solution is proposed to mitigate the confusion attack from malicious activities. Finally, we provide Android with suggestions on how to manage FF windows.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114964446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus 基于小模舍入学习的(确定性)分层身份加密
Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue
In this paper, we propose a hierarchical identity-based encryption (HIBE) scheme in the random oracle (RO) model based on the learning with rounding (LWR) problem over small modulus $q$. Compared with the previous HIBE schemes based on the learning with errors (LWE) problem, the ciphertext expansion ratio of our scheme can be decreased to 1/2. Then, we utilize the HIBE scheme to construct a deterministic hierarchical identity-based encryption (D-HIBE) scheme based on the LWR problem over small modulus. Finally, with the technique of binary tree encryption (BTE) we can construct HIBE and D-HIBE schemes in the standard model based on the LWR problem over small modulus.
本文提出了一种基于小模数$q$上的舍入学习(LWR)问题的随机预估(RO)模型中的分层身份加密(HIBE)方案。与以往基于带错误学习(LWE)问题的HIBE方案相比,该方案的密文扩展比可以降低到1/2。然后,我们利用HIBE方案构造了一个基于小模数LWR问题的确定性分层身份加密(D-HIBE)方案。最后,利用二叉树加密技术(BTE),在基于小模数LWR问题的标准模型中构造了HIBE和D-HIBE方案。
{"title":"(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus","authors":"Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue","doi":"10.1145/2897845.2897922","DOIUrl":"https://doi.org/10.1145/2897845.2897922","url":null,"abstract":"In this paper, we propose a hierarchical identity-based encryption (HIBE) scheme in the random oracle (RO) model based on the learning with rounding (LWR) problem over small modulus $q$. Compared with the previous HIBE schemes based on the learning with errors (LWE) problem, the ciphertext expansion ratio of our scheme can be decreased to 1/2. Then, we utilize the HIBE scheme to construct a deterministic hierarchical identity-based encryption (D-HIBE) scheme based on the LWR problem over small modulus. Finally, with the technique of binary tree encryption (BTE) we can construct HIBE and D-HIBE schemes in the standard model based on the LWR problem over small modulus.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117061795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement 杂耍小工具:使用指令位移的二进制级代码随机化
Hyungjoon Koo, M. Polychronakis
Code diversification is an effective mitigation against return-oriented programming attacks, which breaks the assumptions of attackers about the location and structure of useful instruction sequences, known as "gadgets". Although a wide range of code diversification techniques of varying levels of granularity exist, most of them rely on the availability of source code, debug symbols, or the assumption of fully precise code disassembly, limiting their practical applicability for the protection of closed-source third-party applications. In-place code randomization has been proposed as an alternative binary-compatible diversification technique that is tolerant of partial disassembly coverage, in the expense though of leaving some gadgets intact, at the disposal of attackers. Consequently, the possibility of constructing robust ROP payloads using only the remaining non-randomized gadgets is still open. In this paper we present instruction displacement, a code diversification technique based on static binary instrumentation that does not rely on complete code disassembly coverage. Instruction displacement aims to improve the randomization coverage and entropy of existing binary-level code diversification techniques by displacing any remaining non-randomized gadgets to random locations. The results of our experimental evaluation demonstrate that instruction displacement reduces the number of non-randomized gadgets in the extracted code regions from 15.04% for standalone in-place code randomization, to 2.77% for the combination of both techniques. At the same time, the additional indirection introduced due to displacement incurs a negligible runtime overhead of 0.36% on average for the SPEC CPU2006 benchmarks.
代码多样化是对面向返回的编程攻击的有效缓解,它打破了攻击者对有用指令序列(称为“小工具”)的位置和结构的假设。尽管存在各种不同粒度级别的代码多样化技术,但它们中的大多数依赖于源代码的可用性、调试符号或完全精确的代码反汇编的假设,限制了它们在保护闭源第三方应用程序方面的实际适用性。就地代码随机化已经被提议作为一种替代的二进制兼容多样化技术,它可以容忍部分反汇编覆盖,但代价是让一些小工具完好无损,听任攻击者处置。因此,仅使用剩余的非随机小工具构建稳健ROP有效载荷的可能性仍然是开放的。在本文中,我们提出了指令置换,这是一种基于静态二进制插装的代码多样化技术,它不依赖于完全的代码反汇编覆盖。指令置换旨在通过将任何剩余的非随机小部件置换到随机位置来提高现有二进制级代码多样化技术的随机化覆盖率和熵。我们的实验评估结果表明,指令置换将提取的代码区域中的非随机gadget的数量从单独的原地代码随机化的15.04%减少到两种技术组合的2.77%。同时,在SPEC CPU2006基准测试中,由于位移而引入的额外间接性平均只产生0.36%的可忽略不计的运行时开销。
{"title":"Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement","authors":"Hyungjoon Koo, M. Polychronakis","doi":"10.1145/2897845.2897863","DOIUrl":"https://doi.org/10.1145/2897845.2897863","url":null,"abstract":"Code diversification is an effective mitigation against return-oriented programming attacks, which breaks the assumptions of attackers about the location and structure of useful instruction sequences, known as \"gadgets\". Although a wide range of code diversification techniques of varying levels of granularity exist, most of them rely on the availability of source code, debug symbols, or the assumption of fully precise code disassembly, limiting their practical applicability for the protection of closed-source third-party applications. In-place code randomization has been proposed as an alternative binary-compatible diversification technique that is tolerant of partial disassembly coverage, in the expense though of leaving some gadgets intact, at the disposal of attackers. Consequently, the possibility of constructing robust ROP payloads using only the remaining non-randomized gadgets is still open. In this paper we present instruction displacement, a code diversification technique based on static binary instrumentation that does not rely on complete code disassembly coverage. Instruction displacement aims to improve the randomization coverage and entropy of existing binary-level code diversification techniques by displacing any remaining non-randomized gadgets to random locations. The results of our experimental evaluation demonstrate that instruction displacement reduces the number of non-randomized gadgets in the extracted code regions from 15.04% for standalone in-place code randomization, to 2.77% for the combination of both techniques. At the same time, the additional indirection introduced due to displacement incurs a negligible runtime overhead of 0.36% on average for the SPEC CPU2006 benchmarks.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization FLEX:一个灵活的代码认证框架,用于委托移动应用程序定制
Gabriele Costa, Paolo Gasti, A. Merlo, Shunt-Hsi Yu
Mobile code distribution relies on digital signatures to guarantee code authenticity. Unfortunately, standard signature schemes are not well suited for use in conjunction with program transformation techniques, such as aspect-oriented programming. With these techniques, code development is performed in sequence by multiple teams of programmers. This is fundamentally different from traditional single-developer/ single-user models, where users can verify end-to-end (i.e., developer-to-user) authenticity of the code using digital signatures. To address this limitation, we introduce FLEX, a flexible code authentication framework for mobile applications. FLEX allows semi-trusted intermediaries to modify mobile code without invalidating the developer's signature, as long as the modification complies with a "contract" issued by the developer. We introduce formal definitions for secure code modification, and show that our instantiation of FLEX is secure under these definitions. Although FLEX can be instantiated using any language, we design AMJ--a novel programming language that supports code annotations--and implement a FLEX prototype based on our new language.
移动代码分发依赖于数字签名来保证代码的真实性。不幸的是,标准签名方案并不适合与程序转换技术(如面向方面编程)结合使用。使用这些技术,代码开发由多个程序员团队按顺序执行。这与传统的单开发人员/单用户模型有根本的不同,在传统模型中,用户可以使用数字签名验证端到端(即开发人员到用户)代码的真实性。为了解决这个限制,我们引入FLEX,这是一个灵活的移动应用程序代码身份验证框架。FLEX允许半信任的中介修改移动代码,而不会使开发人员的签名无效,只要修改符合开发人员发布的“合同”。我们介绍了安全代码修改的正式定义,并证明在这些定义下FLEX的实例化是安全的。尽管FLEX可以使用任何语言实例化,但我们设计了AMJ——一种支持代码注释的新颖编程语言——并基于我们的新语言实现了FLEX原型。
{"title":"FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization","authors":"Gabriele Costa, Paolo Gasti, A. Merlo, Shunt-Hsi Yu","doi":"10.1145/2897845.2897887","DOIUrl":"https://doi.org/10.1145/2897845.2897887","url":null,"abstract":"Mobile code distribution relies on digital signatures to guarantee code authenticity. Unfortunately, standard signature schemes are not well suited for use in conjunction with program transformation techniques, such as aspect-oriented programming. With these techniques, code development is performed in sequence by multiple teams of programmers. This is fundamentally different from traditional single-developer/ single-user models, where users can verify end-to-end (i.e., developer-to-user) authenticity of the code using digital signatures. To address this limitation, we introduce FLEX, a flexible code authentication framework for mobile applications. FLEX allows semi-trusted intermediaries to modify mobile code without invalidating the developer's signature, as long as the modification complies with a \"contract\" issued by the developer. We introduce formal definitions for secure code modification, and show that our instantiation of FLEX is secure under these definitions. Although FLEX can be instantiated using any language, we design AMJ--a novel programming language that supports code annotations--and implement a FLEX prototype based on our new language.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications 社会计算应用中推理控制机制的私密性和实用性
Seyed Hossein Ahmadinejad, Philip W. L. Fong, R. Safavi-Naini
Modern social computing platforms (e.g., Facebook) are extensible. Third-party developers deploy extensions (e.g., Facebook applications) that augment the functionalities of the underlying platforms. Previous work demonstrated that permission-based protection mechanisms, adopted to control access to users' personal information, fail to control inference - the inference of private information from public information. We envision an alternative protection model in which user profiles undergo sanitizing transformations before being released to third-party applications. Each transformation specifies an alternative view of the user profile. Unlike permission-based protection, this framework addresses the need for inference control. This work lays the theoretical foundation for view-based protection in three ways. First, existing work in privacy- preserving data publishing focuses on structured data (e.g., tables), but user profiles are semi-structured (e.g., trees). In information-theoretic terms, we define privacy and utility goals that can be applied to semi-structured data. Our notions of privacy and utility are highly targeted, mirroring the set up of social computing platforms, in which users specify their privacy preferences and third-party applications focus their accesses on selected components of the user profile. Second, we define an algebra of trees in which sanitizing transformations previously designed for structured data (e.g., generalization, noise introduction, etc) are now formulated for semi-structured data in terms of tree operations. Third, we evaluate the usefulness of our model by illustrating how the privacy enhancement and utility preservation effects of a view (a sanitizing transformation) can be formally and quantitatively assessed in our model. To the best of our knowledge, ours is the first work to articulate precise privacy and utility goals of inference control mechanisms for third-party applications in social computing platforms.
现代社会计算平台(例如,Facebook)是可扩展的。第三方开发人员部署扩展(例如,Facebook应用程序)来增强底层平台的功能。先前的研究表明,用于控制用户个人信息访问的基于权限的保护机制无法控制推断——从公共信息推断私人信息。我们设想了一种可供选择的保护模型,在该模型中,用户配置文件在发布到第三方应用程序之前要经过消毒转换。每个转换指定用户概要文件的一个备选视图。与基于许可的保护不同,这个框架解决了对推理控制的需求。本工作从三个方面为基于视图的保护奠定了理论基础。首先,现有的保护隐私的数据发布工作侧重于结构化数据(例如,表),而用户配置文件是半结构化的(例如,树)。在信息论术语中,我们定义了可应用于半结构化数据的隐私和实用目标。我们对隐私和效用的概念是高度针对性的,反映了社会计算平台的设置,用户指定他们的隐私偏好,第三方应用程序将访问集中在用户配置文件的选定组件上。其次,我们定义了一个树的代数,其中先前为结构化数据设计的净化转换(例如,泛化,噪声引入等)现在根据树操作为半结构化数据制定。第三,我们通过说明如何在我们的模型中正式和定量地评估视图(消毒转换)的隐私增强和效用保存效果来评估我们模型的有用性。据我们所知,我们的工作是第一个阐明社会计算平台中第三方应用程序的推理控制机制的精确隐私和实用目标的工作。
{"title":"Privacy and Utility of Inference Control Mechanisms for Social Computing Applications","authors":"Seyed Hossein Ahmadinejad, Philip W. L. Fong, R. Safavi-Naini","doi":"10.1145/2897845.2897878","DOIUrl":"https://doi.org/10.1145/2897845.2897878","url":null,"abstract":"Modern social computing platforms (e.g., Facebook) are extensible. Third-party developers deploy extensions (e.g., Facebook applications) that augment the functionalities of the underlying platforms. Previous work demonstrated that permission-based protection mechanisms, adopted to control access to users' personal information, fail to control inference - the inference of private information from public information. We envision an alternative protection model in which user profiles undergo sanitizing transformations before being released to third-party applications. Each transformation specifies an alternative view of the user profile. Unlike permission-based protection, this framework addresses the need for inference control. This work lays the theoretical foundation for view-based protection in three ways. First, existing work in privacy- preserving data publishing focuses on structured data (e.g., tables), but user profiles are semi-structured (e.g., trees). In information-theoretic terms, we define privacy and utility goals that can be applied to semi-structured data. Our notions of privacy and utility are highly targeted, mirroring the set up of social computing platforms, in which users specify their privacy preferences and third-party applications focus their accesses on selected components of the user profile. Second, we define an algebra of trees in which sanitizing transformations previously designed for structured data (e.g., generalization, noise introduction, etc) are now formulated for semi-structured data in terms of tree operations. Third, we evaluate the usefulness of our model by illustrating how the privacy enhancement and utility preservation effects of a view (a sanitizing transformation) can be formally and quantitatively assessed in our model. To the best of our knowledge, ours is the first work to articulate precise privacy and utility goals of inference control mechanisms for third-party applications in social computing platforms.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129643190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS) 隐私保护疾病治疗及并发症预测系统(PDTCPS)
Qinghan Xue, M. Chuah, Yingying Chen
Affordable cloud computing technologies allow users to efficiently store, and manage their Personal Health Records (PHRs) and share with their caregivers or physicians. This in turn improves the quality of healthcare services, and lower health care cost. However, serious security and privacy concerns emerge because people upload their personal information and PHRs to the public cloud. Data encryption provides privacy protection of medical information but it is challenging to utilize encrypted data. In this paper, we present a privacy-preserving disease treatment, complication prediction scheme (PDTCPS), which allows authorized users to conduct searches for disease diagnosis, personalized treatments, and prediction of potential complications. $PDTCPS$ uses a tree-based structure to boost search efficiency, a wildcard approach to support fuzzy keyword search, and a Bloom-filter to improve search accuracy and storage efficiency. In addition, our design also allows health care providers and the public cloud to collectively generate aggregated training models for disease diagnosis, personalized treatments and complications prediction. Moreover, our design provides query unlinkability and hides both search & access patterns. Finally, our evaluation results using two UCI datasets show that our scheme is more efficient and accurate than two existing schemes.
经济实惠的云计算技术允许用户有效地存储和管理他们的个人健康记录(PHRs),并与他们的护理人员或医生共享。这反过来又提高了保健服务的质量,降低了保健成本。然而,严重的安全和隐私问题出现了,因为人们将他们的个人信息和phrr上传到公共云。数据加密为医疗信息提供了隐私保护,但利用加密数据具有挑战性。在本文中,我们提出了一种隐私保护的疾病治疗、并发症预测方案(PDTCPS),该方案允许授权用户进行疾病诊断、个性化治疗和潜在并发症预测的搜索。$PDTCPS$使用基于树的结构来提高搜索效率,使用通配符方法来支持模糊关键字搜索,使用bloom过滤器来提高搜索准确性和存储效率。此外,我们的设计还允许医疗保健提供者和公共云共同生成汇总训练模型,用于疾病诊断、个性化治疗和并发症预测。此外,我们的设计提供了查询不可链接性,并隐藏了搜索和访问模式。最后,在两个UCI数据集上的评估结果表明,我们的方案比现有的两种方案更高效、更准确。
{"title":"Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS)","authors":"Qinghan Xue, M. Chuah, Yingying Chen","doi":"10.1145/2897845.2897893","DOIUrl":"https://doi.org/10.1145/2897845.2897893","url":null,"abstract":"Affordable cloud computing technologies allow users to efficiently store, and manage their Personal Health Records (PHRs) and share with their caregivers or physicians. This in turn improves the quality of healthcare services, and lower health care cost. However, serious security and privacy concerns emerge because people upload their personal information and PHRs to the public cloud. Data encryption provides privacy protection of medical information but it is challenging to utilize encrypted data. In this paper, we present a privacy-preserving disease treatment, complication prediction scheme (PDTCPS), which allows authorized users to conduct searches for disease diagnosis, personalized treatments, and prediction of potential complications. $PDTCPS$ uses a tree-based structure to boost search efficiency, a wildcard approach to support fuzzy keyword search, and a Bloom-filter to improve search accuracy and storage efficiency. In addition, our design also allows health care providers and the public cloud to collectively generate aggregated training models for disease diagnosis, personalized treatments and complications prediction. Moreover, our design provides query unlinkability and hides both search & access patterns. Finally, our evaluation results using two UCI datasets show that our scheme is more efficient and accurate than two existing schemes.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identifying and Utilizing Dependencies Across Cloud Security Services 识别和利用跨云安全服务的依赖关系
Ahmed Taha, P. Metzler, Rubén Trapero, Jesus Luna, N. Suri
Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud computing. Given that multiple Cloud Service Providers (CSPs) offer similar security services (e.g., "encryption key management") albeit with different capabilities and prices, the customers need to comparatively assess the offered security services in order to select the best CSP matching their security requirements. However, the presence of both explicit and implicit dependencies across security related services add further challenges for Cloud customers to (i) specify their security requirements taking service dependencies into consideration and (ii) to determine which CSP can satisfy these requirements. We present a framework to address these challenges. For challenge (i), our framework automatically detects conflicts resulting from inconsistent customer requirements. Moreover, our framework provides an explanation for the detected conflicts allowing customers to resolve these conflicts. To tackle challenge (ii), our framework assesses the security level provided by various CSPs and ranks the CSPs according to the desired customer requirements. We demonstrate the framework's effectiveness with real-world CSP case studies derived from the Cloud Security Alliance's Security, Trust and Assurance Registry.
在组织对采用云计算犹豫不决的原因中,安全问题经常被提及。鉴于多个云服务提供商(CSP)提供类似的安全服务(例如“加密密钥管理”),但功能和价格不同,客户需要比较评估所提供的安全服务,以选择最适合其安全需求的CSP。然而,跨安全相关服务的显式和隐式依赖关系的存在给云计算客户带来了进一步的挑战,他们需要(i)在考虑服务依赖关系的情况下指定其安全需求,以及(ii)确定哪个CSP可以满足这些需求。我们提出了一个解决这些挑战的框架。对于挑战(i),我们的框架自动检测由不一致的客户需求引起的冲突。此外,我们的框架为检测到的冲突提供了解释,允许客户解决这些冲突。为应对挑战(ii),我们的架构会评估各通讯服务供应商所提供的保安水平,并根据客户的要求对通讯服务供应商进行排名。我们通过来自云安全联盟的安全、信任和保证注册表的真实CSP案例研究来证明该框架的有效性。
{"title":"Identifying and Utilizing Dependencies Across Cloud Security Services","authors":"Ahmed Taha, P. Metzler, Rubén Trapero, Jesus Luna, N. Suri","doi":"10.1145/2897845.2897911","DOIUrl":"https://doi.org/10.1145/2897845.2897911","url":null,"abstract":"Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud computing. Given that multiple Cloud Service Providers (CSPs) offer similar security services (e.g., \"encryption key management\") albeit with different capabilities and prices, the customers need to comparatively assess the offered security services in order to select the best CSP matching their security requirements. However, the presence of both explicit and implicit dependencies across security related services add further challenges for Cloud customers to (i) specify their security requirements taking service dependencies into consideration and (ii) to determine which CSP can satisfy these requirements. We present a framework to address these challenges. For challenge (i), our framework automatically detects conflicts resulting from inconsistent customer requirements. Moreover, our framework provides an explanation for the detected conflicts allowing customers to resolve these conflicts. To tackle challenge (ii), our framework assesses the security level provided by various CSPs and ranks the CSPs according to the desired customer requirements. We demonstrate the framework's effectiveness with real-world CSP case studies derived from the Cloud Security Alliance's Security, Trust and Assurance Registry.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms 为什么MAC地址随机化是不够的:Wi-Fi网络发现机制分析
M. Vanhoef, Célestin Matte, M. Cunche, L. Cardoso, F. Piessens
We present several novel techniques to track (unassociated) mobile devices by abusing features of the Wi-Fi standard. This shows that using random MAC addresses, on its own, does not guarantee privacy. First, we show that information elements in probe requests can be used to fingerprint devices. We then combine these fingerprints with incremental sequence numbers, to create a tracking algorithm that does not rely on unique identifiers such as MAC addresses. Based on real-world datasets, we demonstrate that our algorithm can correctly track as much as 50% of devices for at least 20 minutes. We also show that commodity Wi-Fi devices use predictable scrambler seeds. These can be used to improve the performance of our tracking algorithm. Finally, we present two attacks that reveal the real MAC address of a device, even if MAC address randomization is used. In the first one, we create fake hotspots to induce clients to connect using their real MAC address. The second technique relies on the new 802.11u standard, commonly referred to as Hotspot 2.0, where we show that Linux and Windows send Access Network Query Protocol (ANQP) requests using their real MAC address.
我们提出了几种利用Wi-Fi标准的特性来跟踪(非关联)移动设备的新技术。这表明,使用随机MAC地址本身并不能保证隐私。首先,我们展示了探测请求中的信息元素可以用于指纹设备。然后,我们将这些指纹与增量序列号结合起来,创建一个不依赖于MAC地址等唯一标识符的跟踪算法。基于真实世界的数据集,我们证明了我们的算法可以正确跟踪多达50%的设备至少20分钟。我们还表明,商品Wi-Fi设备使用可预测的扰频种子。这些可以用来提高我们的跟踪算法的性能。最后,我们提出了两种攻击,即使使用MAC地址随机化,也能揭示设备的真实MAC地址。在第一个中,我们创建假热点来诱导客户端使用其真实MAC地址进行连接。第二种技术依赖于新的802.11u标准,通常被称为热点2.0,其中我们展示了Linux和Windows使用其真实MAC地址发送接入网查询协议(ANQP)请求。
{"title":"Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms","authors":"M. Vanhoef, Célestin Matte, M. Cunche, L. Cardoso, F. Piessens","doi":"10.1145/2897845.2897883","DOIUrl":"https://doi.org/10.1145/2897845.2897883","url":null,"abstract":"We present several novel techniques to track (unassociated) mobile devices by abusing features of the Wi-Fi standard. This shows that using random MAC addresses, on its own, does not guarantee privacy. First, we show that information elements in probe requests can be used to fingerprint devices. We then combine these fingerprints with incremental sequence numbers, to create a tracking algorithm that does not rely on unique identifiers such as MAC addresses. Based on real-world datasets, we demonstrate that our algorithm can correctly track as much as 50% of devices for at least 20 minutes. We also show that commodity Wi-Fi devices use predictable scrambler seeds. These can be used to improve the performance of our tracking algorithm. Finally, we present two attacks that reveal the real MAC address of a device, even if MAC address randomization is used. In the first one, we create fake hotspots to induce clients to connect using their real MAC address. The second technique relies on the new 802.11u standard, commonly referred to as Hotspot 2.0, where we show that Linux and Windows send Access Network Query Protocol (ANQP) requests using their real MAC address.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130429775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 194
Password-Controlled Encryption with Accountable Break-Glass Access 密码控制加密与负责破玻璃访问
Zhang Tao, Sherman S. M. Chow, Jinyuan Sun
We propose the notion of password-controlled encryption, a two-factor scheme involving a user-chosen password and the master public/secret key pair. The data owner obtains a secret key generated from a password and the master secret key of a key generation center (KGC) after authentication, and shares this password with encryptors and an emergency contact. In normal circumstances, the data owners can enforce access control by themselves. In emergency when the data owner is unavailable, any one with the same password can request for the decryption key from a KGC, without letting the KGC to know the password. At the same time, the KGC is held accountable if the key generation process is abused. Password-controlled encryption is especially applicable for protecting electronic medical record, which provides confidentiality with break-glass access, without relying on a key-escrow server or trusted hardware.
我们提出了密码控制加密的概念,这是一个涉及用户选择的密码和主公钥/密钥对的双因素方案。数据所有者通过身份验证获得由密码生成的密钥和密钥生成中心(KGC)的主密钥,并将该密码共享给加密器和紧急联系人。在正常情况下,数据所有者可以自己实施访问控制。在紧急情况下,当数据所有者不可用时,任何具有相同密码的人都可以向KGC请求解密密钥,而无需让KGC知道密码。与此同时,如果密钥生成过程被滥用,KGC也要承担责任。密码控制的加密特别适用于保护电子病历,它通过破玻璃访问提供机密性,而不依赖于密钥托管服务器或可信硬件。
{"title":"Password-Controlled Encryption with Accountable Break-Glass Access","authors":"Zhang Tao, Sherman S. M. Chow, Jinyuan Sun","doi":"10.1145/2897845.2897869","DOIUrl":"https://doi.org/10.1145/2897845.2897869","url":null,"abstract":"We propose the notion of password-controlled encryption, a two-factor scheme involving a user-chosen password and the master public/secret key pair. The data owner obtains a secret key generated from a password and the master secret key of a key generation center (KGC) after authentication, and shares this password with encryptors and an emergency contact. In normal circumstances, the data owners can enforce access control by themselves. In emergency when the data owner is unavailable, any one with the same password can request for the decryption key from a KGC, without letting the KGC to know the password. At the same time, the KGC is held accountable if the key generation process is abused. Password-controlled encryption is especially applicable for protecting electronic medical record, which provides confidentiality with break-glass access, without relying on a key-escrow server or trusted hardware.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations 基于模型的安全测试:OAuth 2.0实现的实证研究
Ronghai Yang, Guanchen Li, W. Lau, Kehuan Zhang, Pili Hu
Motivated by the prevalence of OAuth-related vulnerabilities in the wild, large-scale security testing of real-world OAuth 2.0 implementations have received increasing attention lately [31,37,42]. However, these existing works either rely on manual discovery of new vulnerabilities in OAuth 2.0 implementations or perform automated testing for specific, previously-known vulnerabilities across a large number of OAuth implementations. In this work, we propose an adaptive model-based testing framework to perform automated, large-scale security assessments for OAuth 2.0 implementations in practice. Key advantages of our approach include (1) its ability to identify existing vulnerabilities and discover new ones in an automated manner; (2) improved testing coverage as all possible execution paths within the scope of the model will be checked and (3) its ability to cater for the implementation differences of practical OAuth systems/ applications, which enables the analyst to offload the manual efforts for large-scale testing of OAuth implementations. We have designed and implemented OAuthTester to realize our proposed framework. Using OAuthTester, we examine the implementations of 4 major Identity Providers as well as 500 top-ranked US and Chinese websites which use the OAuth-based Single-Sign-On service provided by the formers. Our empirical findings demonstrate the efficacy of adaptive model-based testing on OAuth 2.0 deployments at scale. More importantly, OAuthTester not only manages to rediscover various existing vulnerabilities but also identify several previously unknown security flaws and new exploits for a large number of eal-world applications implementing OAuth 2.0.
由于OAuth相关漏洞在野外普遍存在,最近对现实世界OAuth 2.0实现的大规模安全测试受到越来越多的关注[31,37,42]。然而,这些现有的工作要么依赖于手工发现OAuth 2.0实现中的新漏洞,要么依赖于在大量OAuth实现中对特定的、以前已知的漏洞执行自动化测试。在这项工作中,我们提出了一个自适应的基于模型的测试框架,用于在实践中对OAuth 2.0实现进行自动化的大规模安全评估。我们的方法的主要优点包括:(1)它能够识别现有的漏洞,并以自动化的方式发现新的漏洞;(2)提高了测试覆盖率,因为模型范围内的所有可能的执行路径都将被检查;(3)它能够满足实际OAuth系统/应用程序的实现差异,这使分析师能够减轻对OAuth实现的大规模测试的手工工作。我们已经设计并实现了OAuthTester来实现我们提出的框架。使用OAuthTester,我们检查了4个主要身份提供商以及500个排名靠前的美国和中国网站的实现,这些网站使用了由它们提供的基于oauth1的单点登录服务。我们的实证研究结果证明了基于自适应模型的测试在OAuth 2.0大规模部署中的有效性。更重要的是,OAuthTester不仅可以重新发现各种现有的漏洞,还可以为大量实现OAuth 2.0的现实世界应用程序识别一些以前未知的安全漏洞和新的漏洞。
{"title":"Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations","authors":"Ronghai Yang, Guanchen Li, W. Lau, Kehuan Zhang, Pili Hu","doi":"10.1145/2897845.2897874","DOIUrl":"https://doi.org/10.1145/2897845.2897874","url":null,"abstract":"Motivated by the prevalence of OAuth-related vulnerabilities in the wild, large-scale security testing of real-world OAuth 2.0 implementations have received increasing attention lately [31,37,42]. However, these existing works either rely on manual discovery of new vulnerabilities in OAuth 2.0 implementations or perform automated testing for specific, previously-known vulnerabilities across a large number of OAuth implementations. In this work, we propose an adaptive model-based testing framework to perform automated, large-scale security assessments for OAuth 2.0 implementations in practice. Key advantages of our approach include (1) its ability to identify existing vulnerabilities and discover new ones in an automated manner; (2) improved testing coverage as all possible execution paths within the scope of the model will be checked and (3) its ability to cater for the implementation differences of practical OAuth systems/ applications, which enables the analyst to offload the manual efforts for large-scale testing of OAuth implementations. We have designed and implemented OAuthTester to realize our proposed framework. Using OAuthTester, we examine the implementations of 4 major Identity Providers as well as 500 top-ranked US and Chinese websites which use the OAuth-based Single-Sign-On service provided by the formers. Our empirical findings demonstrate the efficacy of adaptive model-based testing on OAuth 2.0 deployments at scale. More importantly, OAuthTester not only manages to rediscover various existing vulnerabilities but also identify several previously unknown security flaws and new exploits for a large number of eal-world applications implementing OAuth 2.0.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130526906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1