首页 > 最新文献

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security最新文献

英文 中文
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks 复杂代码重用攻击分析框架
Mariano Graziano, D. Balzarotti, Alain Zidouemba
Code reuse attacks based on return oriented programming (ROP) are becoming more and more prevalent every year. They started as a way to circumvent operating systems protections against injected code, but they are now also used as a technique to keep the malicious code hidden from detection and analysis systems. This means that while in the past ROP chains were short and simple (and therefore did not require any dedicated tool for their analysis), we recently started to observe very complex algorithms -- such as a complete rootkit -- implemented entirely as a sequence of ROP gadgets. In this paper, we present a set of techniques to analyze complex code reuse attacks. First, we identify and discuss the main challenges that complicate the reverse engineer of code implemented using ROP. Second, we propose an emulation-based framework to dissect, reconstruct, and simplify ROP chains. Finally, we test our tool on the most complex example available to date: a ROP rootkit containing four separate chains, two of them dynamically generated at runtime.
基于面向返回编程(ROP)的代码重用攻击越来越普遍。它们最初是作为一种绕过操作系统对注入代码的保护的方法,但现在它们也被用作一种技术,使恶意代码不被检测和分析系统所隐藏。这意味着,虽然过去的ROP链短而简单(因此不需要任何专门的工具进行分析),但我们最近开始观察到非常复杂的算法——比如一个完整的rootkit——完全作为一系列ROP小工具实现。在本文中,我们提出了一套分析复杂代码重用攻击的技术。首先,我们确定并讨论了使使用ROP实现的代码逆向工程复杂化的主要挑战。其次,我们提出了一个基于仿真的框架来剖析、重构和简化ROP链。最后,我们在迄今为止最复杂的例子上测试了我们的工具:一个包含四个独立链的ROP rootkit,其中两个是在运行时动态生成的。
{"title":"ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks","authors":"Mariano Graziano, D. Balzarotti, Alain Zidouemba","doi":"10.1145/2897845.2897894","DOIUrl":"https://doi.org/10.1145/2897845.2897894","url":null,"abstract":"Code reuse attacks based on return oriented programming (ROP) are becoming more and more prevalent every year. They started as a way to circumvent operating systems protections against injected code, but they are now also used as a technique to keep the malicious code hidden from detection and analysis systems. This means that while in the past ROP chains were short and simple (and therefore did not require any dedicated tool for their analysis), we recently started to observe very complex algorithms -- such as a complete rootkit -- implemented entirely as a sequence of ROP gadgets. In this paper, we present a set of techniques to analyze complex code reuse attacks. First, we identify and discuss the main challenges that complicate the reverse engineer of code implemented using ROP. Second, we propose an emulation-based framework to dissect, reconstruct, and simplify ROP chains. Finally, we test our tool on the most complex example available to date: a ROP rootkit containing four separate chains, two of them dynamically generated at runtime.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Generic Construction of Publicly Verifiable Predicate Encryption 公开可验证谓词加密的一般构造
Chuting Tan, Z. L. Jiang, Xuan Wang, S. Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang
There is an increasing trend for data owners to store their data in a third-party cloud server and buy the service from the cloud server to provide information to other users. To ensure confidentiality, the data is usually encrypted. Therefore, an encrypted data searching scheme with privacy preserving is of paramount importance. Predicate encryption (PE) is one of the attractive solutions due to its attribute-hiding merit. However, as cloud is not always trusted, verifying the searched results is also crucial. Firstly, a generic construction of Publicly Verifiable Predicate Encryption (PVPE) scheme is proposed to provide verification for PE. We reduce the security of PVPE to the security of PE. However, from practical point of view, to decrease the communication overhead and computation overhead, an improved PVPE is proposed with the trade-off of a small probability of error.
数据所有者将其数据存储在第三方云服务器中,并从云服务器购买服务以向其他用户提供信息的趋势正在增加。为了确保机密性,数据通常是加密的。因此,一种保护隐私的加密数据搜索方案至关重要。谓词加密(PE)由于其属性隐藏的优点而成为一种有吸引力的解决方案。然而,由于云并不总是可信的,因此验证搜索结果也至关重要。首先,提出了一种公共可验证谓词加密(PVPE)方案的通用构造,为PVPE提供验证。我们将PVPE的安全性降低到PE的安全性。然而,从实际应用的角度出发,为了减少通信开销和计算开销,提出了一种改进的PVPE,并以较小的错误概率为代价。
{"title":"Generic Construction of Publicly Verifiable Predicate Encryption","authors":"Chuting Tan, Z. L. Jiang, Xuan Wang, S. Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang","doi":"10.1145/2897845.2897919","DOIUrl":"https://doi.org/10.1145/2897845.2897919","url":null,"abstract":"There is an increasing trend for data owners to store their data in a third-party cloud server and buy the service from the cloud server to provide information to other users. To ensure confidentiality, the data is usually encrypted. Therefore, an encrypted data searching scheme with privacy preserving is of paramount importance. Predicate encryption (PE) is one of the attractive solutions due to its attribute-hiding merit. However, as cloud is not always trusted, verifying the searched results is also crucial. Firstly, a generic construction of Publicly Verifiable Predicate Encryption (PVPE) scheme is proposed to provide verification for PE. We reduce the security of PVPE to the security of PE. However, from practical point of view, to decrease the communication overhead and computation overhead, an improved PVPE is proposed with the trade-off of a small probability of error.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps revDroid: Android应用动态撤销权限后副作用的代码分析
Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, X. Wang, Zhiyun Qian, Hao Chen
Dynamic revocation of permissions of installed Android applications has been gaining popularity, because of the increasing concern of security and privacy in the Android platform. However, applications often crash or misbehave when their permissions are revoked, rendering applications completely unusable. Even though Google has officially introduced the new permission mechanism in Android 6.0 to explicitly support dynamic permission revocation, the issue still exists. In this paper, we conduct an empirical study to understand the latest application practice post Android 6.0. Specifically, we design a practical tool, referred to as revDroid, to help us to empirically analyze how often the undesirable side effects, especially application crash, can occur in off-the-shelf Android applications. From the analysis of 248 popular applications from Google Play Store, revDroid finds out that 70% applications and 46% permission-relevant calls do not appropriately catch exceptions caused by permission revocation, while third-party libraries pay much more attention to permission revocation. We also use revDroid to analyze 132 recent malware samples. The result shows that only 27% malwares and 36% permission-relevant API calls of malwares fail to consider the permission revocation. In fact, many of them perform specialized handling of permission revocation to keep the core malicious logic running. Finally, revDroid can be used to help developers uncover the unhandled permission revocations during development time and greatly improve the application quality.
动态撤销已安装的Android应用程序的权限越来越受欢迎,因为Android平台越来越关注安全性和隐私性。但是,当应用程序的权限被撤销时,应用程序通常会崩溃或行为失常,从而使应用程序完全不可用。尽管Google在Android 6.0中正式引入了新的权限机制,明确支持动态权限撤销,但这个问题仍然存在。本文通过实证研究来了解Android 6.0之后的最新应用实践。具体来说,我们设计了一个实用的工具,称为revDroid,以帮助我们从经验上分析在现成的Android应用程序中出现不良副作用(尤其是应用程序崩溃)的频率。revDroid通过对Google Play Store 248个热门应用的分析发现,70%的应用和46%的权限相关调用没有适当地捕捉到权限撤销导致的异常,而第三方库则更加关注权限撤销。我们还使用revDroid分析了132个最近的恶意软件样本。结果表明,只有27%的恶意软件和36%的恶意软件的权限相关API调用不考虑权限撤销。实际上,它们中的许多执行专门的权限撤销处理,以保持核心恶意逻辑的运行。最后,revDroid可以帮助开发人员在开发期间发现未处理的权限撤销,并大大提高应用程序质量。
{"title":"revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps","authors":"Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, X. Wang, Zhiyun Qian, Hao Chen","doi":"10.1145/2897845.2897914","DOIUrl":"https://doi.org/10.1145/2897845.2897914","url":null,"abstract":"Dynamic revocation of permissions of installed Android applications has been gaining popularity, because of the increasing concern of security and privacy in the Android platform. However, applications often crash or misbehave when their permissions are revoked, rendering applications completely unusable. Even though Google has officially introduced the new permission mechanism in Android 6.0 to explicitly support dynamic permission revocation, the issue still exists. In this paper, we conduct an empirical study to understand the latest application practice post Android 6.0. Specifically, we design a practical tool, referred to as revDroid, to help us to empirically analyze how often the undesirable side effects, especially application crash, can occur in off-the-shelf Android applications. From the analysis of 248 popular applications from Google Play Store, revDroid finds out that 70% applications and 46% permission-relevant calls do not appropriately catch exceptions caused by permission revocation, while third-party libraries pay much more attention to permission revocation. We also use revDroid to analyze 132 recent malware samples. The result shows that only 27% malwares and 36% permission-relevant API calls of malwares fail to consider the permission revocation. In fact, many of them perform specialized handling of permission revocation to keep the core malicious logic running. Finally, revDroid can be used to help developers uncover the unhandled permission revocations during development time and greatly improve the application quality.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms 基于智能手表的击键推理攻击和上下文感知保护机制
Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He
Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. In this paper, we demonstrate how applications that have access to motion or inertial sensor data on a modern smartwatch can recover text typed on an external QWERTY keyboard. Due to the distinct nature of the perceptible motion sensor data, earlier research efforts on emanation based keystroke inference attacks are not readily applicable in this scenario. The proposed novel attack framework characterizes wrist movements (captured by the inertial sensors of the smartwatch worn on the wrist) observed during typing, based on the relative physical position of keys and the direction of transition between pairs of keys. Eavesdropped keystroke characteristics are then matched to candidate words in a dictionary. Multiple evaluations show that our keystroke inference framework has an alarmingly high classification accuracy and word recovery rate. With the information recovered from the wrist movements perceptible by a smartwatch, we exemplify the risks associated with unaudited access to seemingly innocuous sensors (e.g., accelerometers and gyroscopes) of wearable devices. As part of our efforts towards preventing such side-channel attacks, we also develop and evaluate a novel context-aware protection framework which can be used to automatically disable (or downgrade) access to motion sensors, whenever typing activity is detected.
可穿戴设备,如智能手表,配备了最先进的传感器,可以实现一系列环境感知应用。但是,如果访问不经过审核,恶意应用程序可能会滥用这些传感器。在本文中,我们演示了如何在现代智能手表上访问运动或惯性传感器数据的应用程序可以恢复在外部QWERTY键盘上键入的文本。由于可感知运动传感器数据的不同性质,早期基于发射的按键推理攻击的研究成果并不容易适用于这种情况。提出的新攻击框架基于键的相对物理位置和键对之间的过渡方向,描述了在打字过程中观察到的手腕运动(由手腕上佩戴的智能手表的惯性传感器捕获)。然后将窃听到的击键特征与字典中的候选单词相匹配。多次评估表明,我们的击键推理框架具有惊人的高分类精度和单词恢复率。通过从智能手表可感知的手腕运动中恢复的信息,我们举例说明了未经审计访问可穿戴设备上看似无害的传感器(例如加速度计和陀螺仪)所带来的风险。作为我们努力防止此类侧信道攻击的一部分,我们还开发和评估了一种新的上下文感知保护框架,该框架可用于在检测到打字活动时自动禁用(或降级)对运动传感器的访问。
{"title":"Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms","authors":"Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He","doi":"10.1145/2897845.2897905","DOIUrl":"https://doi.org/10.1145/2897845.2897905","url":null,"abstract":"Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. In this paper, we demonstrate how applications that have access to motion or inertial sensor data on a modern smartwatch can recover text typed on an external QWERTY keyboard. Due to the distinct nature of the perceptible motion sensor data, earlier research efforts on emanation based keystroke inference attacks are not readily applicable in this scenario. The proposed novel attack framework characterizes wrist movements (captured by the inertial sensors of the smartwatch worn on the wrist) observed during typing, based on the relative physical position of keys and the direction of transition between pairs of keys. Eavesdropped keystroke characteristics are then matched to candidate words in a dictionary. Multiple evaluations show that our keystroke inference framework has an alarmingly high classification accuracy and word recovery rate. With the information recovered from the wrist movements perceptible by a smartwatch, we exemplify the risks associated with unaudited access to seemingly innocuous sensors (e.g., accelerometers and gyroscopes) of wearable devices. As part of our efforts towards preventing such side-channel attacks, we also develop and evaluate a novel context-aware protection framework which can be used to automatically disable (or downgrade) access to motion sensors, whenever typing activity is detected.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130781053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer NFPS:在Flash转换层添加不可检测的安全删除
Shijie Jia, Luning Xia, Bo Chen, Peng Liu
Securely removing data from modern computing systems is challenging, as past existence of the deleted data may leave artifacts in the layout at all layers of a computing system, which can be utilized by the adversary to infer information about the deleted data. Conventional overwriting-based and encryption-based solutions are not sufficient, as they cannot remove these artifacts. In this work, we aim to securely remove data from NAND flash-based block devices. We observed that completely removing the aforementioned artifacts from NAND flash is expensive, as it may require re-organizing the entire flash layout. We thus approach this security goal from a new angle. We investigate undetectable secure deletion, a novel security notion which can 1) remove the deleted data from flash devices, such that the adversary cannot have access to the deleted data once they have been removed, and 2) conceal the deletion history, such that the adversary cannot find out there was a deletion in the past. We design NAND Flash Partial Scrubbing (NFPS), the first undetectable secure deletion scheme for NAND flash-based block devices. We propose partial page reprogramming and partial block erasure methods to sanitize data from NAND flash. In addition, we incorporate NFPS to typical Flash Translation Layer (FTL) algorithms. Finally, we implement NFPS and experimentally evaluate its effectiveness.
安全地从现代计算系统中删除数据是一项挑战,因为过去存在的已删除数据可能会在计算系统的所有层的布局中留下工件,攻击者可以利用这些工件来推断有关已删除数据的信息。传统的基于覆盖和基于加密的解决方案是不够的,因为它们不能删除这些工件。在这项工作中,我们的目标是安全地从基于NAND闪存的块设备中删除数据。我们观察到,从NAND闪存中完全去除上述工件是昂贵的,因为它可能需要重新组织整个闪存布局。因此,我们从一个新的角度来探讨这一安全目标。我们研究了不可检测的安全删除,这是一种新的安全概念,它可以1)从闪存设备中删除已删除的数据,这样攻击者就无法访问已删除的数据,并且2)隐藏删除历史,这样攻击者就无法发现过去有删除。我们设计了NAND闪存部分擦除(NFPS),这是基于NAND闪存的块设备的第一个不可检测的安全删除方案。我们提出部分页重编程和部分块擦除方法来清理NAND闪存中的数据。此外,我们将NFPS整合到典型的Flash转换层(FTL)算法中。最后,我们实现了NFPS并对其有效性进行了实验评估。
{"title":"NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer","authors":"Shijie Jia, Luning Xia, Bo Chen, Peng Liu","doi":"10.1145/2897845.2897882","DOIUrl":"https://doi.org/10.1145/2897845.2897882","url":null,"abstract":"Securely removing data from modern computing systems is challenging, as past existence of the deleted data may leave artifacts in the layout at all layers of a computing system, which can be utilized by the adversary to infer information about the deleted data. Conventional overwriting-based and encryption-based solutions are not sufficient, as they cannot remove these artifacts. In this work, we aim to securely remove data from NAND flash-based block devices. We observed that completely removing the aforementioned artifacts from NAND flash is expensive, as it may require re-organizing the entire flash layout. We thus approach this security goal from a new angle. We investigate undetectable secure deletion, a novel security notion which can 1) remove the deleted data from flash devices, such that the adversary cannot have access to the deleted data once they have been removed, and 2) conceal the deletion history, such that the adversary cannot find out there was a deletion in the past. We design NAND Flash Partial Scrubbing (NFPS), the first undetectable secure deletion scheme for NAND flash-based block devices. We propose partial page reprogramming and partial block erasure methods to sanitize data from NAND flash. In addition, we incorporate NFPS to typical Flash Translation Layer (FTL) algorithms. Finally, we implement NFPS and experimentally evaluate its effectiveness.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131474242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Cross Processor Cache Attacks 跨处理器缓存攻击
Gorka Irazoqui Apecechea, T. Eisenbarth, B. Sunar
Multi-processor systems are becoming the de-facto standard across different computing domains, ranging from high-end multi-tenant cloud servers to low-power mobile platforms. The denser integration of CPUs creates an opportunity for great economic savings achieved by packing processes of multiple tenants or by bundling all kinds of tasks at various privilege levels to share the same platform. This level of sharing carries with it a serious risk of leaking sensitive information through the shared microarchitectural components. Microarchitectural attacks initially only exploited core-private resources, but were quickly generalized to resources shared within the CPU. We present the first fine grain side channel attack that works across processors. The attack does not require CPU co-location of the attacker and the victim. The novelty of the proposed work is that, for the first time the directory protocol of high efficiency CPU interconnects is targeted. The directory protocol is common to all modern multi-CPU systems. Examples include AMD's HyperTransport, Intel's Quickpath, and ARM's AMBA Coherent Interconnect. The proposed attack does not rely on any specific characteristic of the cache hierarchy, e.g. inclusiveness. Note that inclusiveness was assumed in all earlier works. Furthermore, the viability of the proposed covert channel is demonstrated with two new attacks: by recovering a full AES key in OpenSSL, and a full ElGamal key in libgcrypt within the range of seconds on a shared AMD Opteron server.
从高端多租户云服务器到低功耗移动平台,多处理器系统正在成为跨不同计算领域的事实上的标准。cpu的密集集成可以通过打包多个租户的流程或将不同特权级别的各种任务捆绑在一起共享同一个平台,从而节省大量的经济成本。这种级别的共享带来了通过共享的微架构组件泄露敏感信息的严重风险。微架构攻击最初只利用核心私有资源,但很快被推广到CPU内共享的资源。我们提出了第一个跨处理器工作的细粒度侧信道攻击。这种攻击不需要攻击者和受害者的CPU共存。本文的新颖之处在于,首次针对高效CPU互连的目录协议进行了研究。目录协议对于所有现代多cpu系统都是通用的。例如AMD的HyperTransport、Intel的Quickpath和ARM的AMBA Coherent Interconnect。提出的攻击不依赖于缓存层次结构的任何特定特征,例如包容性。请注意,在所有早期的作品中都假设了包容性。此外,所提出的隐蔽通道的可行性通过两种新的攻击来证明:在共享的AMD Opteron服务器上,在几秒钟内恢复OpenSSL中的完整AES密钥和libcrypt中的完整ElGamal密钥。
{"title":"Cross Processor Cache Attacks","authors":"Gorka Irazoqui Apecechea, T. Eisenbarth, B. Sunar","doi":"10.1145/2897845.2897867","DOIUrl":"https://doi.org/10.1145/2897845.2897867","url":null,"abstract":"Multi-processor systems are becoming the de-facto standard across different computing domains, ranging from high-end multi-tenant cloud servers to low-power mobile platforms. The denser integration of CPUs creates an opportunity for great economic savings achieved by packing processes of multiple tenants or by bundling all kinds of tasks at various privilege levels to share the same platform. This level of sharing carries with it a serious risk of leaking sensitive information through the shared microarchitectural components. Microarchitectural attacks initially only exploited core-private resources, but were quickly generalized to resources shared within the CPU. We present the first fine grain side channel attack that works across processors. The attack does not require CPU co-location of the attacker and the victim. The novelty of the proposed work is that, for the first time the directory protocol of high efficiency CPU interconnects is targeted. The directory protocol is common to all modern multi-CPU systems. Examples include AMD's HyperTransport, Intel's Quickpath, and ARM's AMBA Coherent Interconnect. The proposed attack does not rely on any specific characteristic of the cache hierarchy, e.g. inclusiveness. Note that inclusiveness was assumed in all earlier works. Furthermore, the viability of the proposed covert channel is demonstrated with two new attacks: by recovering a full AES key in OpenSSL, and a full ElGamal key in libgcrypt within the range of seconds on a shared AMD Opteron server.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130207334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition 车辆自我监视:传感器支持的自动驾驶员识别
Ian D. Markwood, Yao Liu
Motor vehicles are widely used, quite valuable, and often targeted for theft. Preventive measures include car alarms, proximity control, and physical locks, which can be bypassed if the car is left unlocked, or if the thief obtains the keys. Reactive strategies like cameras, motion detectors, human patrolling, and GPS tracking can monitor a vehicle, but may not detect car thefts in a timely manner. We propose a fast automatic driver recognition system that identifies unauthorized drivers while overcoming the drawbacks of previous approaches. We factor drivers' trips into elemental driving events, from which we extract their driving preference features that cannot be exactly reproduced by a thief driving away in the stolen car. We performed real world evaluation using the driving data collected from 31 volunteers. Experiment results show we can distinguish the current driver as the owner with 97% accuracy, while preventing impersonation 91% of the time.
机动车辆被广泛使用,价值很高,而且经常成为盗窃的目标。预防措施包括汽车警报、接近控制和物理锁,如果汽车没有上锁,或者小偷拿到了钥匙,这些锁就可以被绕过。诸如摄像头、运动探测器、人工巡逻和GPS跟踪等反应性策略可以监控车辆,但可能无法及时发现汽车盗窃。我们提出了一种快速的自动驾驶员识别系统,该系统可以识别未经授权的驾驶员,同时克服了以往方法的缺点。我们将司机的旅行纳入基本驾驶事件,从中提取他们的驾驶偏好特征,这些特征不能被小偷驾驶偷来的车完全复制。我们使用从31名志愿者那里收集的驾驶数据进行了真实世界的评估。实验结果表明,识别当前驾驶员为车主的准确率为97%,防止冒充的准确率为91%。
{"title":"Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition","authors":"Ian D. Markwood, Yao Liu","doi":"10.1145/2897845.2897917","DOIUrl":"https://doi.org/10.1145/2897845.2897917","url":null,"abstract":"Motor vehicles are widely used, quite valuable, and often targeted for theft. Preventive measures include car alarms, proximity control, and physical locks, which can be bypassed if the car is left unlocked, or if the thief obtains the keys. Reactive strategies like cameras, motion detectors, human patrolling, and GPS tracking can monitor a vehicle, but may not detect car thefts in a timely manner. We propose a fast automatic driver recognition system that identifies unauthorized drivers while overcoming the drawbacks of previous approaches. We factor drivers' trips into elemental driving events, from which we extract their driving preference features that cannot be exactly reproduced by a thief driving away in the stolen car. We performed real world evaluation using the driving data collected from 31 volunteers. Experiment results show we can distinguish the current driver as the owner with 97% accuracy, while preventing impersonation 91% of the time.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121990798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware StormDroid:基于流式机器学习的安卓恶意软件检测系统
Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu
Mobile devices are especially vulnerable nowadays to malware attacks, thanks to the current trend of increased app downloads. Despite the significant security and privacy concerns it received, effective malware detection (MD) remains a significant challenge. This paper tackles this challenge by introducing a streaminglized machine learning-based MD framework, StormDroid: (i) The core of StormDroid is based on machine learning, enhanced with a novel combination of contributed features that we observed over a fairly large collection of data set; and (ii) we streaminglize the whole MD process to support large-scale analysis, yielding an efficient and scalable MD technique that observes app behaviors statically and dynamically. Evaluated on roughly 8,000 applications, our combination of contributed features improves MD accuracy by almost 10% compared with state-of-the-art antivirus systems; in parallel our streaminglized process, StormDroid, further improves efficiency rate by approximately three times than a single thread.
由于当前应用程序下载量增加的趋势,移动设备如今特别容易受到恶意软件的攻击。尽管恶意软件的安全和隐私问题备受关注,但有效的恶意软件检测(MD)仍是一项重大挑战。本文通过引入基于机器学习的流式化恶意软件检测框架 StormDroid 来应对这一挑战:(i) StormDroid 的核心基于机器学习,并利用我们在相当大的数据集中观察到的贡献特征的新组合进行了增强;(ii) 我们将整个恶意软件检测过程流式化以支持大规模分析,从而产生了一种高效且可扩展的恶意软件检测技术,可静态和动态地观察应用程序的行为。在对大约 8000 个应用程序进行评估后发现,与最先进的杀毒系统相比,我们所贡献的特征组合提高了近 10% 的 MD 准确率;与此同时,我们的流式化流程 StormDroid 进一步提高了效率,比单线程提高了约三倍。
{"title":"StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware","authors":"Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu","doi":"10.1145/2897845.2897860","DOIUrl":"https://doi.org/10.1145/2897845.2897860","url":null,"abstract":"Mobile devices are especially vulnerable nowadays to malware attacks, thanks to the current trend of increased app downloads. Despite the significant security and privacy concerns it received, effective malware detection (MD) remains a significant challenge. This paper tackles this challenge by introducing a streaminglized machine learning-based MD framework, StormDroid: (i) The core of StormDroid is based on machine learning, enhanced with a novel combination of contributed features that we observed over a fairly large collection of data set; and (ii) we streaminglize the whole MD process to support large-scale analysis, yielding an efficient and scalable MD technique that observes app behaviors statically and dynamically. Evaluated on roughly 8,000 applications, our combination of contributed features improves MD accuracy by almost 10% compared with state-of-the-art antivirus systems; in parallel our streaminglized process, StormDroid, further improves efficiency rate by approximately three times than a single thread.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131043818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 162
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract 基于全同态加密的高效保密性矩阵分解:扩展摘要
Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, H. Yoon, Jun-Bum Shin
Recommendation systems become popular in our daily life. It is well known that the more the release of users' personal data, the better the quality of recommendation. However, such services raise serious privacy concerns for users. In this paper, focusing on matrix factorization-based recommendation systems, we propose the first privacy-preserving matrix factorization using fully homomorphic encryption. On inputs of encrypted users' ratings, our protocol performs matrix factorization over the encrypted data and returns encrypted outputs so that the recommendation system knows nothing on rating values and resulting user/item profiles. It provides a way to obfuscate the number and list of items a user rated without harming the accuracy of recommendation, and additionally protects recommender's tuning parameters for business benefit and allows the recommender to optimize the parameters for quality of service. To overcome performance degradation caused by the use of fully homomorphic encryption, we introduce a novel data structure to perform computations over encrypted vectors, which are essential operations for matrix factorization, through secure 2-party computation in part. With the data structure, the proposed protocol requires dozens of times less computation cost over those of previous works. Our experiments on a personal computer with 3.4 GHz 6-cores 64 GB RAM show that the proposed protocol runs in 1.5 minutes per iteration. It is more efficient than Nikolaenko et al.'s work proposed in CCS 2013, in which it took about 170 minutes on two servers with 1.9 GHz 16-cores 128 GB RAM.
推荐系统在我们的日常生活中越来越流行。众所周知,用户的个人数据发布越多,推荐的质量就越好。然而,这些服务给用户带来了严重的隐私问题。本文针对基于矩阵分解的推荐系统,提出了第一个使用全同态加密的保护隐私的矩阵分解方法。对于加密用户评分的输入,我们的协议对加密数据执行矩阵分解,并返回加密输出,这样推荐系统对评分值和生成的用户/项目配置文件一无所知。它提供了一种在不影响推荐准确性的情况下模糊用户评价的项目数量和列表的方法,并且还保护了推荐人的业务利益调整参数,并允许推荐人优化服务质量的参数。为了克服使用完全同态加密引起的性能下降,我们引入了一种新的数据结构来执行对加密向量的计算,这是通过安全的2方计算进行矩阵分解的基本操作。在这样的数据结构下,该协议的计算量比以往的工作减少了几十倍。我们在3.4 GHz 6核64gb RAM的个人计算机上进行的实验表明,所提出的协议每次迭代运行时间为1.5分钟。它比Nikolaenko等人在CCS 2013中提出的工作效率更高,其中在两台1.9 GHz 16核128 GB RAM的服务器上花费了大约170分钟。
{"title":"Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract","authors":"Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, H. Yoon, Jun-Bum Shin","doi":"10.1145/2897845.2897875","DOIUrl":"https://doi.org/10.1145/2897845.2897875","url":null,"abstract":"Recommendation systems become popular in our daily life. It is well known that the more the release of users' personal data, the better the quality of recommendation. However, such services raise serious privacy concerns for users. In this paper, focusing on matrix factorization-based recommendation systems, we propose the first privacy-preserving matrix factorization using fully homomorphic encryption. On inputs of encrypted users' ratings, our protocol performs matrix factorization over the encrypted data and returns encrypted outputs so that the recommendation system knows nothing on rating values and resulting user/item profiles. It provides a way to obfuscate the number and list of items a user rated without harming the accuracy of recommendation, and additionally protects recommender's tuning parameters for business benefit and allows the recommender to optimize the parameters for quality of service. To overcome performance degradation caused by the use of fully homomorphic encryption, we introduce a novel data structure to perform computations over encrypted vectors, which are essential operations for matrix factorization, through secure 2-party computation in part. With the data structure, the proposed protocol requires dozens of times less computation cost over those of previous works. Our experiments on a personal computer with 3.4 GHz 6-cores 64 GB RAM show that the proposed protocol runs in 1.5 minutes per iteration. It is more efficient than Nikolaenko et al.'s work proposed in CCS 2013, in which it took about 170 minutes on two servers with 1.9 GHz 16-cores 128 GB RAM.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications uc安全双服务器密码认证协议及其应用
Lin Zhang, Zhenfeng Zhang, Xuexian Hu
A two-server password-based authentication (2PA) protocol is a special kind of authentication primitive that provides additional protection for the user's password. Through a 2PA protocol, a user can distribute his low-entropy password between two authentication servers in the initialization phase and authenticate himself merely via a matching password in the login phase. No single server can learn any information about the user's password, nor impersonate the legitimate user to authenticate to the honest server. In this paper, we first formulate and realize the security definition of two-server password-based authentication in the well-known universal composability (UC) framework, which thus provides desirable properties such as composable security. We show that our construction is suitable for the asymmetric communication model in which one server acts as the front-end server interacting directly with the user and the other stays backstage. Then, we show that our protocol could be easily extended to more complicate password-based cryptographic protocols such as two-server password-authenticated key exchange (2PAKE) and two-server password-authenticated secret sharing (2PASS), which enjoy stronger security guarantees and better efficiency performances in comparison with the existing schemes.
基于双服务器密码的身份验证(2PA)协议是一种特殊的身份验证原语,它为用户的密码提供额外的保护。通过2PA协议,用户可以在初始化阶段在两个身份验证服务器之间分发其低熵密码,而在登录阶段仅通过匹配的密码对自己进行身份验证。没有任何一台服务器可以了解用户的密码信息,也不能冒充合法用户向诚实服务器进行身份验证。本文首先在众所周知的通用可组合性(UC)框架中,提出并实现了基于双服务器密码的身份验证的安全定义,从而提供了可组合安全性等理想的特性。我们表明,我们的结构适合于非对称通信模型,其中一个服务器作为前端服务器直接与用户交互,而另一个服务器留在后台。然后,我们证明了该协议可以很容易地扩展到更复杂的基于密码的加密协议,如双服务器密码认证密钥交换(2PAKE)和双服务器密码认证密钥共享(2PASS),与现有方案相比,具有更强的安全保证和更好的效率性能。
{"title":"UC-secure Two-Server Password-Based Authentication Protocol and Its Applications","authors":"Lin Zhang, Zhenfeng Zhang, Xuexian Hu","doi":"10.1145/2897845.2897872","DOIUrl":"https://doi.org/10.1145/2897845.2897872","url":null,"abstract":"A two-server password-based authentication (2PA) protocol is a special kind of authentication primitive that provides additional protection for the user's password. Through a 2PA protocol, a user can distribute his low-entropy password between two authentication servers in the initialization phase and authenticate himself merely via a matching password in the login phase. No single server can learn any information about the user's password, nor impersonate the legitimate user to authenticate to the honest server. In this paper, we first formulate and realize the security definition of two-server password-based authentication in the well-known universal composability (UC) framework, which thus provides desirable properties such as composable security. We show that our construction is suitable for the asymmetric communication model in which one server acts as the front-end server interacting directly with the user and the other stays backstage. Then, we show that our protocol could be easily extended to more complicate password-based cryptographic protocols such as two-server password-authenticated key exchange (2PAKE) and two-server password-authenticated secret sharing (2PASS), which enjoy stronger security guarantees and better efficiency performances in comparison with the existing schemes.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1