首页 > 最新文献

Digital Threats: Research and Practice最新文献

英文 中文
Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components 代码多态与代码加密:软件组件的机密性和侧信道保护
Pub Date : 2021-10-01 DOI: 10.1145/3487058
L. Morel, Damien Couroussé, Thomas Hiscock
In this article, we consider that, in practice, attack scenarios involving side-channel analysis combine two successive phases: an analysis phase, targeting the extraction of information about the target and the identification of possible vulnerabilities, and an exploitation phase, applying attack techniques on candidate vulnerabilities. We advocate that protections need to cover these two phases to be effective against real-life attacks. We present PolEn, a toolchain and a processor architecture that combine countermeasures to provide an effective mitigation of side-channel attacks: As a countermeasure against the analysis phase, our approach considers the use of code encryption; as a countermeasure against the exploitation phase, our approach considers the use of code polymorphism, because it relies on runtime code generation, and its combination with code encryption is particularly challenging. Code encryption is supported by a processor extension such that machine instructions are only decrypted inside the CPU, which effectively prevents reverse engineering or any extraction of useful information from memory dumps. Code polymorphism is implemented by software means. It regularly changes the observable behaviour of the program, making it unpredictable for an attacker, hence reducing the possibility to exploit side-channel leakages. We present a prototype implementation, based on the RISC-V Spike simulator and a modified LLVM toolchain. In our experimental evaluation, we illustrate that PolEn effectively reduces side-channel leakages. For the protected functions evaluated, static memory use increases by a factor of 5 to 22, corresponding to the joint application of code encryption and code polymorphism. The overhead, in terms of execution time, ranges between a factor of 1.8 and 4.6.
在本文中,我们认为,在实践中,涉及侧信道分析的攻击场景结合了两个连续的阶段:分析阶段,旨在提取有关目标的信息并识别可能的漏洞,以及利用阶段,将攻击技术应用于候选漏洞。我们主张,保护措施需要涵盖这两个阶段,才能有效抵御现实生活中的攻击。我们提出了PolEn,一种工具链和处理器架构,结合对策来有效缓解侧信道攻击:作为针对分析阶段的对策,我们的方法考虑使用代码加密;作为对抗开发阶段的对策,我们的方法考虑了代码多态性的使用,因为它依赖于运行时代码生成,并且它与代码加密的组合特别具有挑战性。代码加密由处理器扩展支持,这样机器指令只能在CPU内部解密,这有效地防止了逆向工程或从内存转储中提取有用信息。代码多态是通过软件实现的。它定期改变程序的可观察行为,使攻击者无法预测,从而减少利用侧信道泄漏的可能性。我们提出了一个基于RISC-V Spike模拟器和改进的LLVM工具链的原型实现。在我们的实验评估中,我们证明了花粉有效地减少了侧通道泄漏。对于评估的受保护函数,静态内存使用增加了5到22倍,对应于代码加密和代码多态性的联合应用。就执行时间而言,开销在1.8到4.6倍之间。
{"title":"Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components","authors":"L. Morel, Damien Couroussé, Thomas Hiscock","doi":"10.1145/3487058","DOIUrl":"https://doi.org/10.1145/3487058","url":null,"abstract":"In this article, we consider that, in practice, attack scenarios involving side-channel analysis combine two successive phases: an analysis phase, targeting the extraction of information about the target and the identification of possible vulnerabilities, and an exploitation phase, applying attack techniques on candidate vulnerabilities. We advocate that protections need to cover these two phases to be effective against real-life attacks. We present PolEn, a toolchain and a processor architecture that combine countermeasures to provide an effective mitigation of side-channel attacks: As a countermeasure against the analysis phase, our approach considers the use of code encryption; as a countermeasure against the exploitation phase, our approach considers the use of code polymorphism, because it relies on runtime code generation, and its combination with code encryption is particularly challenging. Code encryption is supported by a processor extension such that machine instructions are only decrypted inside the CPU, which effectively prevents reverse engineering or any extraction of useful information from memory dumps. Code polymorphism is implemented by software means. It regularly changes the observable behaviour of the program, making it unpredictable for an attacker, hence reducing the possibility to exploit side-channel leakages. We present a prototype implementation, based on the RISC-V Spike simulator and a modified LLVM toolchain. In our experimental evaluation, we illustrate that PolEn effectively reduces side-channel leakages. For the protected functions evaluated, static memory use increases by a factor of 5 to 22, corresponding to the joint application of code encryption and code polymorphism. The overhead, in terms of execution time, ranges between a factor of 1.8 and 4.6.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125767442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT 经验教训:物联网基于puf的认证协议分析
Pub Date : 2021-09-24 DOI: 10.1145/3487060
K. Lounis, Mohammad Zulkernine
The service of authentication constitutes the spine of all security properties. It is the phase where entities prove their identities to each other and generally establish and derive cryptographic keys to provide confidentiality, data integrity, non-repudiation, and availability. Due to the heterogeneity and the particular security requirements of IoT (Internet of Things), developing secure, low-cost, and lightweight authentication protocols has become a serious challenge. This has excited the research community to design and develop new authentication protocols that meet IoT requirements. An interesting hardware technology, called PUFs (Physical Unclonable Functions), has been the subject of many subsequent publications on lightweight, low-cost, and secure-by-design authentication protocols. This has turned our attention to investigate the most recent PUF-based authentication protocols for IoT. In this paper, we review the security of these protocols. We first provide the necessary background on PUFs, their types, and related attacks. Also, we discuss how PUFs are used for authentication. Then, we analyze the security of PUF-based authentication protocols to identify and report common security issues and design flaws, as well as to provide recommendations for future authentication protocol designers.
身份验证服务构成了所有安全属性的支柱。在这个阶段,实体相互证明自己的身份,通常建立和派生加密密钥,以提供机密性、数据完整性、不可否认性和可用性。由于物联网的异构性和特殊的安全要求,开发安全、低成本和轻量级的身份验证协议已经成为一项严峻的挑战。这激发了研究界设计和开发满足物联网要求的新身份验证协议。一种有趣的硬件技术,称为puf(物理不可克隆函数),已经成为许多关于轻量级、低成本和设计安全的身份验证协议的后续出版物的主题。这将我们的注意力转移到研究最新的基于puf的物联网身份验证协议上。在本文中,我们回顾了这些协议的安全性。我们首先提供puf、它们的类型和相关攻击的必要背景知识。此外,我们还将讨论如何使用puf进行身份验证。然后,我们分析了基于puf的身份验证协议的安全性,以识别和报告常见的安全问题和设计缺陷,并为未来的身份验证协议设计者提供建议。
{"title":"Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT","authors":"K. Lounis, Mohammad Zulkernine","doi":"10.1145/3487060","DOIUrl":"https://doi.org/10.1145/3487060","url":null,"abstract":"The service of authentication constitutes the spine of all security properties. It is the phase where entities prove their identities to each other and generally establish and derive cryptographic keys to provide confidentiality, data integrity, non-repudiation, and availability. Due to the heterogeneity and the particular security requirements of IoT (Internet of Things), developing secure, low-cost, and lightweight authentication protocols has become a serious challenge. This has excited the research community to design and develop new authentication protocols that meet IoT requirements. An interesting hardware technology, called PUFs (Physical Unclonable Functions), has been the subject of many subsequent publications on lightweight, low-cost, and secure-by-design authentication protocols. This has turned our attention to investigate the most recent PUF-based authentication protocols for IoT. In this paper, we review the security of these protocols. We first provide the necessary background on PUFs, their types, and related attacks. Also, we discuss how PUFs are used for authentication. Then, we analyze the security of PUF-based authentication protocols to identify and report common security issues and design flaws, as well as to provide recommendations for future authentication protocol designers.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115686985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sensor Identification via Acoustic Physically Unclonable Function 基于声学物理不可克隆功能的传感器识别
Pub Date : 2021-09-24 DOI: 10.1145/3488306
Girish Vaidya, Prabhakar T.V., N. Gnani, Ryan Shah, Shishir Nagaraja
The traceability of components on a supply chain from a production facility to deployment and maintenance depends upon its irrefutable identity. There are two well-known identification methods: an identity code stored in the memory and embedding custom identification hardware. While storing the identity code is susceptible to malicious and unintentional attacks, the approach of embedding a custom identification hardware is infeasible for sensor nodes assembled with Commercially-Off-the-Shelf devices. We propose a novel identifier - Acoustic PUF based on the innate properties of the sensor node. Acoustic PUF combines the uniqueness component and the position component of the sensor device signature. The uniqueness component is derived by exploiting the manufacturing tolerances, thus making the signature unclonable. The position component is derived through acoustic fingerprinting, thus giving a sticky identity to the sensor device. We evaluate Acoustic PUF for Uniqueness, Repeatability, and Position identity with a deployment spanning several weeks. Through our experimental evaluation and further numerical analysis, we prove that Acoustic PUF can uniquely identify thousands of devices with 99% accuracy while simultaneously detecting the change in position. We use the physical position of a device within a synthetic sound-field both as an identity measure as well as to validate physical integrity of the device.
供应链上从生产设施到部署和维护的组件的可追溯性取决于其无可辩驳的身份。有两种众所周知的识别方法:存储在内存中的标识码和嵌入自定义识别硬件。虽然存储身份码容易受到恶意和无意的攻击,但嵌入自定义识别硬件的方法对于使用商用现货设备组装的传感器节点是不可行的。基于传感器节点的固有特性,提出了一种新的识别方法——声学PUF。声学PUF结合了传感器设备特征的唯一性分量和位置分量。通过利用制造公差推导出唯一性分量,从而使签名不可克隆。位置分量是通过声学指纹提取的,从而为传感器设备提供了粘性身份。我们通过几个星期的部署来评估声学PUF的唯一性、可重复性和位置识别性。通过实验评估和进一步的数值分析,我们证明了声学PUF能够以99%的准确率唯一识别数千个设备,同时检测位置变化。我们使用设备在合成声场中的物理位置作为身份测量以及验证设备的物理完整性。
{"title":"Sensor Identification via Acoustic Physically Unclonable Function","authors":"Girish Vaidya, Prabhakar T.V., N. Gnani, Ryan Shah, Shishir Nagaraja","doi":"10.1145/3488306","DOIUrl":"https://doi.org/10.1145/3488306","url":null,"abstract":"The traceability of components on a supply chain from a production facility to deployment and maintenance depends upon its irrefutable identity. There are two well-known identification methods: an identity code stored in the memory and embedding custom identification hardware. While storing the identity code is susceptible to malicious and unintentional attacks, the approach of embedding a custom identification hardware is infeasible for sensor nodes assembled with Commercially-Off-the-Shelf devices. We propose a novel identifier - Acoustic PUF based on the innate properties of the sensor node. Acoustic PUF combines the uniqueness component and the position component of the sensor device signature. The uniqueness component is derived by exploiting the manufacturing tolerances, thus making the signature unclonable. The position component is derived through acoustic fingerprinting, thus giving a sticky identity to the sensor device. We evaluate Acoustic PUF for Uniqueness, Repeatability, and Position identity with a deployment spanning several weeks. Through our experimental evaluation and further numerical analysis, we prove that Acoustic PUF can uniquely identify thousands of devices with 99% accuracy while simultaneously detecting the change in position. We use the physical position of a device within a synthetic sound-field both as an identity measure as well as to validate physical integrity of the device.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125594557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Exposure Driven Intelligence in Smart, Circular Cities 智能循环城市中脆弱性暴露驱动的智能
Pub Date : 2021-09-24 DOI: 10.1145/3487059
Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos
In this article, we study the vulnerability management dimension in smart city initiatives. As many cities across the globe invest a considerable amount of effort, resources and budget to modernise their infrastructure by deploying a series of technologies such as 5G, Software Defined Networks, and IoT, we conduct an empirical analysis of their current exposure to existing vulnerabilities. We use an updated vulnerability dataset that is further enriched by quantitative research data from independent studies evaluating the maturity and accomplishments of cities in their journey to become smart. We particularly focus on cities that aspire to implement a (data-driven) Circular Economy agenda that we consider to potentially yield the highest risk from a vulnerabilities exposure perspective. Findings show that although a smarter city is attributed with a higher vulnerability exposure, investments on technology and human capital moderate this exposure in a way that it can be reduced.
在本文中,我们研究了智慧城市倡议中的脆弱性管理维度。由于全球许多城市投入了大量的精力、资源和预算,通过部署5G、软件定义网络和物联网等一系列技术来实现其基础设施的现代化,我们对其当前暴露于现有漏洞的情况进行了实证分析。我们使用了一个更新的脆弱性数据集,该数据集进一步丰富了来自独立研究的定量研究数据,这些研究评估了城市在智能之旅中的成熟度和成就。我们特别关注那些渴望实施(数据驱动的)循环经济议程的城市,我们认为从脆弱性暴露的角度来看,这些城市可能产生最高的风险。研究结果表明,尽管智慧城市的脆弱性更高,但对技术和人力资本的投资可以在一定程度上缓和这种风险,从而降低风险。
{"title":"Vulnerability Exposure Driven Intelligence in Smart, Circular Cities","authors":"Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos","doi":"10.1145/3487059","DOIUrl":"https://doi.org/10.1145/3487059","url":null,"abstract":"In this article, we study the vulnerability management dimension in smart city initiatives. As many cities across the globe invest a considerable amount of effort, resources and budget to modernise their infrastructure by deploying a series of technologies such as 5G, Software Defined Networks, and IoT, we conduct an empirical analysis of their current exposure to existing vulnerabilities. We use an updated vulnerability dataset that is further enriched by quantitative research data from independent studies evaluating the maturity and accomplishments of cities in their journey to become smart. We particularly focus on cities that aspire to implement a (data-driven) Circular Economy agenda that we consider to potentially yield the highest risk from a vulnerabilities exposure perspective. Findings show that although a smarter city is attributed with a higher vulnerability exposure, investments on technology and human capital moderate this exposure in a way that it can be reduced.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gotta Catch ’em All: A Multistage Framework for Honeypot Fingerprinting 要抓住他们全部:蜜罐指纹的多级框架
Pub Date : 2021-09-22 DOI: 10.1145/3584976
Shreyas Srinivasa, J. Pedersen, Emmanouil Vasilomanolakis
Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well as a method for learning how adversaries work and think. However, over the past years, several researchers have shown methods for fingerprinting honeypots. This significantly decreases the value of a honeypot; if an attacker is able to recognize the existence of such a system, they can evade it. In this article, we revisit the honeypot identification field, by providing a holistic framework that includes state-of-the-art and novel fingerprinting components. We decrease the probability of false positives by proposing a rigid multi-step approach for labeling a system as a honeypot. We perform extensive scans covering 2.9 billion addresses of the IPv4 space and identify a total of 21,855 honeypot instances. Moreover, we present several interesting side findings such as the identification of around 355,000 non-honeypot systems that represent potentially misconfigured or unpatched vulnerable servers (e.g., SSH servers with default password configurations and vulnerable versions). We ethically disclose our findings to network administrators about the default configuration and the honeypot developers about the gaps in implementation that lead to possible honeypot fingerprinting. Last, we discuss countermeasures against honeypot fingerprinting techniques.
蜜罐是一种诱饵系统,通过向攻击者展示一个看似脆弱的系统来引诱攻击者。它们提供了一种早期检测机制,以及一种了解对手如何工作和思考的方法。然而,在过去的几年里,一些研究人员已经展示了指纹蜜罐的方法。这大大降低了蜜罐的价值;如果攻击者能够识别出这样一个系统的存在,他们就可以逃避它。在本文中,我们通过提供一个包括最先进和新颖指纹组件的整体框架,重新审视蜜罐识别领域。我们通过提出一种严格的多步骤方法来将系统标记为蜜罐,从而降低误报的概率。我们对IPv4空间的29亿个地址进行了广泛的扫描,并确定了总共21,855个蜜罐实例。此外,我们还提出了一些有趣的发现,例如识别了大约355,000个非蜜罐系统,这些系统代表了可能配置错误或未打补丁的易受攻击的服务器(例如,具有默认密码配置和易受攻击版本的SSH服务器)。我们有道德地向网络管理员披露我们关于默认配置的发现,并向蜜罐开发人员披露可能导致蜜罐指纹的实现差距。最后,讨论了蜜罐指纹识别技术的防范措施。
{"title":"Gotta Catch ’em All: A Multistage Framework for Honeypot Fingerprinting","authors":"Shreyas Srinivasa, J. Pedersen, Emmanouil Vasilomanolakis","doi":"10.1145/3584976","DOIUrl":"https://doi.org/10.1145/3584976","url":null,"abstract":"Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well as a method for learning how adversaries work and think. However, over the past years, several researchers have shown methods for fingerprinting honeypots. This significantly decreases the value of a honeypot; if an attacker is able to recognize the existence of such a system, they can evade it. In this article, we revisit the honeypot identification field, by providing a holistic framework that includes state-of-the-art and novel fingerprinting components. We decrease the probability of false positives by proposing a rigid multi-step approach for labeling a system as a honeypot. We perform extensive scans covering 2.9 billion addresses of the IPv4 space and identify a total of 21,855 honeypot instances. Moreover, we present several interesting side findings such as the identification of around 355,000 non-honeypot systems that represent potentially misconfigured or unpatched vulnerable servers (e.g., SSH servers with default password configurations and vulnerable versions). We ethically disclose our findings to network administrators about the default configuration and the honeypot developers about the gaps in implementation that lead to possible honeypot fingerprinting. Last, we discuss countermeasures against honeypot fingerprinting techniques.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117251096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Threat Intelligence Quality Dimensions for Research and Practice 研究与实践的威胁情报质量维度
Pub Date : 2021-09-10 DOI: 10.1145/3484202
Adam Zibak, Clemens Sauerwein, Andrew C. Simpson
As the adoption and diversity of threat intelligence solutions continue to grow, questions about their effectiveness, particularly in regards to the quality of the data they provide, remain unanswered. Several studies have highlighted data quality issues as one of the most common barriers to effective threat intelligence sharing. Furthermore, research and practice lack a common understanding of the expected quality of threat intelligence. To investigate these issues, our research utilised a systematic literature review followed by a modified Delphi study that involved 30 threat intelligence experts in Europe. We identified a set of threat intelligence quality dimensions along with revised definitions for threat data, information, and intelligence.
随着威胁情报解决方案的采用和多样性不断增加,有关其有效性的问题,特别是有关其提供的数据质量的问题,仍未得到解答。几项研究强调,数据质量问题是有效共享威胁情报的最常见障碍之一。此外,研究和实践缺乏对威胁情报预期质量的共同理解。为了调查这些问题,我们的研究利用了系统的文献综述,随后进行了修改的德尔菲研究,涉及30名欧洲威胁情报专家。我们确定了一套威胁情报质量维度,并修订了威胁数据、信息和情报的定义。
{"title":"Threat Intelligence Quality Dimensions for Research and Practice","authors":"Adam Zibak, Clemens Sauerwein, Andrew C. Simpson","doi":"10.1145/3484202","DOIUrl":"https://doi.org/10.1145/3484202","url":null,"abstract":"As the adoption and diversity of threat intelligence solutions continue to grow, questions about their effectiveness, particularly in regards to the quality of the data they provide, remain unanswered. Several studies have highlighted data quality issues as one of the most common barriers to effective threat intelligence sharing. Furthermore, research and practice lack a common understanding of the expected quality of threat intelligence. To investigate these issues, our research utilised a systematic literature review followed by a modified Delphi study that involved 30 threat intelligence experts in Europe. We identified a set of threat intelligence quality dimensions along with revised definitions for threat data, information, and intelligence.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131464323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Risk-aware Fine-grained Access Control in Cyber-physical Contexts 网络物理环境中风险感知的细粒度访问控制
Pub Date : 2021-08-13 DOI: 10.1145/3480468
Jinxin Liu, Murat Simsek, B. Kantarci, M. Erol-Kantarci, A. Malton, Andrew Walenstein
Access to resources by users may need to be granted only upon certain conditions and contexts, perhaps particularly in cyber-physical settings. Unfortunately, creating and modifying context-sensitive access control solutions in dynamic environments creates ongoing challenges to manage the authorization contexts. This article proposes RASA, a context-sensitive access authorization approach and mechanism leveraging unsupervised machine learning to automatically infer risk-based authorization decision boundaries. We explore RASA in a healthcare usage environment, wherein cyber and physical conditions create context-specific risks for protecting private health information. The risk levels are associated with access control decisions recommended by a security policy. A coupling method is introduced to track coexistence of the objects within context using frequency and duration of coexistence, and these are clustered to reveal sets of actions with common risk levels; these are used to create authorization decision boundaries. In addition, we propose a method for assessing the risk level and labelling the clusters with respect to their corresponding risk levels. We evaluate the promise of RASA-generated policies against a heuristic rule-based policy. By employing three different coupling features (frequency-based, duration-based, and combined features), the decisions of the unsupervised method and that of the policy are more than 99% consistent.
用户对资源的访问可能只需要在某些条件和上下文中被授予,可能特别是在网络物理设置中。不幸的是,在动态环境中创建和修改上下文敏感的访问控制解决方案会给管理授权上下文带来持续的挑战。本文提出了RASA,一种上下文敏感的访问授权方法和机制,利用无监督机器学习来自动推断基于风险的授权决策边界。我们将探讨医疗保健使用环境中的RASA,其中网络和物理条件为保护私人健康信息创造了特定于环境的风险。风险级别与安全策略推荐的访问控制决策相关联。引入了一种耦合方法,利用共存的频率和持续时间来跟踪上下文中对象的共存,并对这些对象进行聚类以揭示具有共同风险级别的动作集;它们用于创建授权决策边界。此外,我们提出了一种评估风险水平和标记集群相对于其相应的风险水平的方法。我们根据启发式的基于规则的策略来评估rasa生成的策略的承诺。通过采用三种不同的耦合特征(基于频率、基于持续时间和组合特征),无监督方法的决策与策略的决策一致性超过99%。
{"title":"Risk-aware Fine-grained Access Control in Cyber-physical Contexts","authors":"Jinxin Liu, Murat Simsek, B. Kantarci, M. Erol-Kantarci, A. Malton, Andrew Walenstein","doi":"10.1145/3480468","DOIUrl":"https://doi.org/10.1145/3480468","url":null,"abstract":"Access to resources by users may need to be granted only upon certain conditions and contexts, perhaps particularly in cyber-physical settings. Unfortunately, creating and modifying context-sensitive access control solutions in dynamic environments creates ongoing challenges to manage the authorization contexts. This article proposes RASA, a context-sensitive access authorization approach and mechanism leveraging unsupervised machine learning to automatically infer risk-based authorization decision boundaries. We explore RASA in a healthcare usage environment, wherein cyber and physical conditions create context-specific risks for protecting private health information. The risk levels are associated with access control decisions recommended by a security policy. A coupling method is introduced to track coexistence of the objects within context using frequency and duration of coexistence, and these are clustered to reveal sets of actions with common risk levels; these are used to create authorization decision boundaries. In addition, we propose a method for assessing the risk level and labelling the clusters with respect to their corresponding risk levels. We evaluate the promise of RASA-generated policies against a heuristic rule-based policy. By employing three different coupling features (frequency-based, duration-based, and combined features), the decisions of the unsupervised method and that of the policy are more than 99% consistent.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories 分析漏洞对不同工件存储库的直接和传递影响
Pub Date : 2021-07-02 DOI: 10.1145/3472811
Johannes Düsing, Ben Hermann
In modern-day software development, a vast amount of public software libraries enable the reuse of existing implementations for reoccurring tasks and common problems. While this practice does yield significant benefits in productivity, it also puts an increasing amount of responsibility on library maintainers. If a security flaw is contained in a library release, then it may directly affect thousands of applications that are depending on it. Given the fact that libraries are often interconnected, meaning they are depending on other libraries for certain sub-tasks, the impact of a single vulnerability may be large, and is hard to quantify. Recent studies have shown that developers in fact struggle with upgrading vulnerable dependencies, despite ever-increasing support by automated tools, which are often publicly available. With our work, we aim to improve on this situation by providing an in-depth analysis on how developers handle vulnerability patches and dependency upgrades. To do so, we contribute a miner for artifact dependency graphs supporting different programming platforms, which annotates the graph with vulnerability information. We execute our application and generate a data set for the artifact repositories Maven Central, NuGet.org, and the NPM Registry, with the resulting graph being stored in a Neo4j graph database. Afterwards, we conduct an extensive analysis of our data, which is aimed at understanding the impact of vulnerabilities for the three different repositories. Finally, we summarize the resulting risks and derive possible mitigation strategies for library maintainers and software developers based on our findings. We found that NuGet.org, the smallest artifact repository in our sample, is subject to fewer security concerns than Maven Central or the NPM Registry. However, for all repositories, we found that vulnerabilities may influence libraries via long transitive dependency chains and that a vulnerability in a single library may affect thousands of other libraries transitively.
在现代软件开发中,大量的公共软件库可以重用现有的实现来处理重复出现的任务和常见问题。虽然这种做法确实在生产力方面产生了显著的好处,但它也增加了库维护人员的责任。如果库发行版中包含安全缺陷,那么它可能直接影响依赖于它的数千个应用程序。考虑到库通常是相互关联的,这意味着它们依赖于其他库来完成某些子任务,单个漏洞的影响可能很大,并且很难量化。最近的研究表明,尽管自动化工具的支持不断增加,但开发人员实际上仍在努力升级易受攻击的依赖项,这些工具通常是公开可用的。通过我们的工作,我们的目标是通过深入分析开发人员如何处理漏洞补丁和依赖项升级来改善这种情况。为此,我们为支持不同编程平台的工件依赖图提供了一个挖掘器,它用漏洞信息注释了图。我们执行我们的应用程序并为工件存储库Maven Central、NuGet.org和NPM Registry生成数据集,生成的图形存储在Neo4j图形数据库中。之后,我们对数据进行了广泛的分析,目的是了解漏洞对三个不同存储库的影响。最后,我们总结了由此产生的风险,并根据我们的发现为库维护者和软件开发人员推导出可能的缓解策略。我们发现,在我们的示例中最小的工件存储库NuGet.org受到的安全问题比Maven Central或NPM Registry要少。然而,对于所有存储库,我们发现漏洞可能会通过长传递依赖链影响库,并且单个库中的漏洞可能会传递地影响数千个其他库。
{"title":"Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories","authors":"Johannes Düsing, Ben Hermann","doi":"10.1145/3472811","DOIUrl":"https://doi.org/10.1145/3472811","url":null,"abstract":"In modern-day software development, a vast amount of public software libraries enable the reuse of existing implementations for reoccurring tasks and common problems. While this practice does yield significant benefits in productivity, it also puts an increasing amount of responsibility on library maintainers. If a security flaw is contained in a library release, then it may directly affect thousands of applications that are depending on it. Given the fact that libraries are often interconnected, meaning they are depending on other libraries for certain sub-tasks, the impact of a single vulnerability may be large, and is hard to quantify. Recent studies have shown that developers in fact struggle with upgrading vulnerable dependencies, despite ever-increasing support by automated tools, which are often publicly available. With our work, we aim to improve on this situation by providing an in-depth analysis on how developers handle vulnerability patches and dependency upgrades. To do so, we contribute a miner for artifact dependency graphs supporting different programming platforms, which annotates the graph with vulnerability information. We execute our application and generate a data set for the artifact repositories Maven Central, NuGet.org, and the NPM Registry, with the resulting graph being stored in a Neo4j graph database. Afterwards, we conduct an extensive analysis of our data, which is aimed at understanding the impact of vulnerabilities for the three different repositories. Finally, we summarize the resulting risks and derive possible mitigation strategies for library maintainers and software developers based on our findings. We found that NuGet.org, the smallest artifact repository in our sample, is subject to fewer security concerns than Maven Central or the NPM Registry. However, for all repositories, we found that vulnerabilities may influence libraries via long transitive dependency chains and that a vulnerability in a single library may affect thousands of other libraries transitively.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ExSol
Pub Date : 2021-06-08 DOI: 10.1145/3428156
Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn
No longer just prophesied about, cyber-attacks to Energy Delivery Systems (EDS) (e.g., the power grid, gas and oil industries) are now very real dangers that result in non-trivial economical losses and inconveniences to modern societies. In such a context, risk analysis has been proposed as a valuable way to identify, analyze, and mitigate potential vulnerabilities, threats, and attack vectors. However, performing risk analysis for EDS is difficult due to their innate structural diversity and interdependencies, along with an always-increasing threatscape. Therefore, there is a need for a methodology to evaluate the current system state, identify vulnerabilities, and qualify risk at multiple granularities in a collaborative manner among different actors in the context of EDS. With this in mind, this article presents ExSol, a collaborative, real-time, risk assessment ecosystem that features an approach for modeling real-life EDS infrastructures, an ontology traversal technique that retrieves well-defined security requirements from well-reputed documents on cyber-protection for EDS infrastructures, as well as a methodology for calculating risk for a single asset and for an entire system. Moreover, we also provide experimental evidence involving a series of attack scenarios in both simulated and real-world EDS environments, which ultimately encourage the adoption of ExSol in practice.
对能源输送系统(EDS)(例如,电网、天然气和石油工业)的网络攻击不再只是预言,现在是非常现实的危险,会给现代社会造成不小的经济损失和不便。在这种情况下,风险分析被认为是识别、分析和减轻潜在漏洞、威胁和攻击向量的一种有价值的方法。然而,由于其固有的结构多样性和相互依赖性,以及不断增加的威胁,对EDS进行风险分析是困难的。因此,需要一种方法来评估当前系统状态,识别漏洞,并在EDS环境中以不同参与者之间的协作方式在多个粒度上限定风险。考虑到这一点,本文介绍了ExSol,这是一个协作的、实时的风险评估生态系统,其特点是建模现实生活中的EDS基础设施的方法,一种本体遍历技术,可以从EDS基础设施的网络保护方面的知名文档中检索定义良好的安全需求,以及计算单个资产和整个系统风险的方法。此外,我们还提供了在模拟和现实EDS环境中涉及一系列攻击场景的实验证据,最终鼓励在实践中采用ExSol。
{"title":"ExSol","authors":"Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn","doi":"10.1145/3428156","DOIUrl":"https://doi.org/10.1145/3428156","url":null,"abstract":"No longer just prophesied about, cyber-attacks to Energy Delivery Systems (EDS) (e.g., the power grid, gas and oil industries) are now very real dangers that result in non-trivial economical losses and inconveniences to modern societies. In such a context, risk analysis has been proposed as a valuable way to identify, analyze, and mitigate potential vulnerabilities, threats, and attack vectors. However, performing risk analysis for EDS is difficult due to their innate structural diversity and interdependencies, along with an always-increasing threatscape. Therefore, there is a need for a methodology to evaluate the current system state, identify vulnerabilities, and qualify risk at multiple granularities in a collaborative manner among different actors in the context of EDS. With this in mind, this article presents ExSol, a collaborative, real-time, risk assessment ecosystem that features an approach for modeling real-life EDS infrastructures, an ontology traversal technique that retrieves well-defined security requirements from well-reputed documents on cyber-protection for EDS infrastructures, as well as a methodology for calculating risk for a single asset and for an entire system. Moreover, we also provide experimental evidence involving a series of attack scenarios in both simulated and real-world EDS environments, which ultimately encourage the adoption of ExSol in practice.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121307788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing a Decision Support Tool for SOC Analysts 评估SOC分析师的决策支持工具
Pub Date : 2021-06-08 DOI: 10.1145/3430753
J. Happa, Ioannis Agrafiotis, Martin Helmhout, Thomas Bashford-Rogers, M. Goldsmith, S. Creese
It is difficult to discern real-world consequences of attacks on an enterprise when investigating network-centric data alone. In recent years, many tools have been developed to help understand attacks using visualisation, but few aim to predict real-world consequences. We have developed a visualisation tool that aims to improve decision support during attacks in Security Operation Centres (SOCs). Our tool visualises propagation of risks from sensor alert data to Business Process (BP) tasks. This is an important capability gap present in many SOCs today, as most threat detection tools are technology-centric. In this article, we present a user study that assesses our tool’s usability and ability to support the analyst. Ten analysts from seven SOCs performed carefully designed tasks related to understanding risks and recovery decision-making. The study was conducted in laboratory conditions with simulated attacks and used a mixed-method approach to collect data from questionnaires, eye tracking, and semi-structured interviews. Our findings suggest that relating business tasks to network asset in visualisations can help analysts prioritise response strategies. Finally, our article also provides an in-depth discussion on user studies conducted with SOC analysts more generally, including lessons learned, recommendations and a critique of our own study.
在单独调查以网络为中心的数据时,很难辨别攻击对企业造成的现实后果。近年来,已经开发了许多工具来帮助使用可视化来理解攻击,但很少有工具旨在预测现实世界的后果。我们开发了一种可视化工具,旨在改善安全运营中心(soc)在攻击期间的决策支持。我们的工具将从传感器警报数据到业务流程(BP)任务的风险传播可视化。这是当今许多soc中存在的一个重要的能力差距,因为大多数威胁检测工具都是以技术为中心的。在本文中,我们提供了一个用户研究,评估我们的工具的可用性和支持分析师的能力。来自7个soc的10名分析师执行了与理解风险和恢复决策相关的精心设计的任务。该研究是在模拟攻击的实验室条件下进行的,并使用混合方法从问卷调查、眼动追踪和半结构化访谈中收集数据。我们的研究结果表明,将业务任务与可视化中的网络资产联系起来可以帮助分析师确定响应策略的优先级。最后,我们的文章还提供了与SOC分析师进行的更广泛的用户研究的深入讨论,包括经验教训,建议和对我们自己研究的批评。
{"title":"Assessing a Decision Support Tool for SOC Analysts","authors":"J. Happa, Ioannis Agrafiotis, Martin Helmhout, Thomas Bashford-Rogers, M. Goldsmith, S. Creese","doi":"10.1145/3430753","DOIUrl":"https://doi.org/10.1145/3430753","url":null,"abstract":"It is difficult to discern real-world consequences of attacks on an enterprise when investigating network-centric data alone. In recent years, many tools have been developed to help understand attacks using visualisation, but few aim to predict real-world consequences. We have developed a visualisation tool that aims to improve decision support during attacks in Security Operation Centres (SOCs). Our tool visualises propagation of risks from sensor alert data to Business Process (BP) tasks. This is an important capability gap present in many SOCs today, as most threat detection tools are technology-centric. In this article, we present a user study that assesses our tool’s usability and ability to support the analyst. Ten analysts from seven SOCs performed carefully designed tasks related to understanding risks and recovery decision-making. The study was conducted in laboratory conditions with simulated attacks and used a mixed-method approach to collect data from questionnaires, eye tracking, and semi-structured interviews. Our findings suggest that relating business tasks to network asset in visualisations can help analysts prioritise response strategies. Finally, our article also provides an in-depth discussion on user studies conducted with SOC analysts more generally, including lessons learned, recommendations and a critique of our own study.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130126395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Digital Threats: Research and Practice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1