首页 > 最新文献

Proceedings 2019 Network and Distributed System Security Symposium最新文献

英文 中文
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT IoTGuard:商品物联网中安全与安全政策的动态执行
Pub Date : 2019-01-01 DOI: 10.14722/NDSS.2019.23326
Z. Berkay Celik, Gang Tan, P. Mcdaniel
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has changed the way we live, play, and work. To date, the traditional approach to securing IoT has treated devices individually. However, in practice, it has been recently shown that the interactions among devices are often the real cause of safety and security violations. In this paper, we present IOTGUARD, a dynamic, policy-based enforcement system for IoT, which protects users from unsafe and insecure device states by monitoring the behavior of IoT and triggeraction platform apps. IOTGUARD operates in three phases: (a) implementation of a code instrumentor that adds extra logic to an app’s source code to collect app’s information at runtime, (b) storing the apps’ information in a dynamic model that represents the runtime execution behavior of apps, and (c) identifying IoT safety and security policies, and enforcing relevant policies on the dynamic model of individual apps or sets of interacting apps. We demonstrate IOTGUARD on 20 flawed apps and find that IOTGUARD correctly enforces 12 of the 12 policy violations. In addition, we evaluate IOTGUARD on 35 SmartThings IoT and 30 IFTTT trigger-action platform market apps executed in a simulated smart home. IOTGUARD enforces 11 unique policies and blocks 16 states in six (17.1%) SmartThings and five (16.6%) IFTTT apps. IOTGUARD imposes only 17.3% runtime overhead on an app and 19.8% for five interacting apps. Through this effort, we introduce a rigorously grounded system for enforcing correct operation of IoT devices through systematically identified IoT policies, demonstrating the effectiveness and value of monitoring IoT apps with tools such as IOTGUARD.
广义上定义为物联网(IoT),将物理过程与数字连接相结合的商品设备的增长改变了我们生活、娱乐和工作的方式。迄今为止,保护物联网的传统方法是单独处理设备。然而,在实践中,最近已经表明,设备之间的相互作用往往是安全违规的真正原因。在本文中,我们介绍了IOTGUARD,一个动态的、基于策略的物联网执行系统,它通过监控物联网和触发平台应用程序的行为来保护用户免受不安全和不安全的设备状态的影响。IOTGUARD分为三个阶段:(a)实现一个代码工具,在应用程序的源代码中添加额外的逻辑,以在运行时收集应用程序的信息;(b)将应用程序的信息存储在代表应用程序运行时执行行为的动态模型中;(c)识别物联网安全和安全策略,并在单个应用程序或交互应用程序集的动态模型上执行相关策略。我们在20个有缺陷的应用程序上演示了IOTGUARD,发现IOTGUARD正确执行了12个策略违规中的12个。此外,我们在模拟智能家居中执行的35个智能物联网和30个IFTTT触发操作平台市场应用程序中评估了IOTGUARD。IOTGUARD在6个(17.1%)SmartThings和5个(16.6%)IFTTT应用程序中执行了11个独特的策略,并阻止了16个州。IOTGUARD只对一个应用程序施加17.3%的运行时开销,对5个交互应用程序施加19.8%的运行时开销。通过这一努力,我们引入了一个严格的基础系统,通过系统地识别物联网策略来强制物联网设备正确运行,展示了使用IOTGUARD等工具监控物联网应用程序的有效性和价值。
{"title":"IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT","authors":"Z. Berkay Celik, Gang Tan, P. Mcdaniel","doi":"10.14722/NDSS.2019.23326","DOIUrl":"https://doi.org/10.14722/NDSS.2019.23326","url":null,"abstract":"Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has changed the way we live, play, and work. To date, the traditional approach to securing IoT has treated devices individually. However, in practice, it has been recently shown that the interactions among devices are often the real cause of safety and security violations. In this paper, we present IOTGUARD, a dynamic, policy-based enforcement system for IoT, which protects users from unsafe and insecure device states by monitoring the behavior of IoT and triggeraction platform apps. IOTGUARD operates in three phases: (a) implementation of a code instrumentor that adds extra logic to an app’s source code to collect app’s information at runtime, (b) storing the apps’ information in a dynamic model that represents the runtime execution behavior of apps, and (c) identifying IoT safety and security policies, and enforcing relevant policies on the dynamic model of individual apps or sets of interacting apps. We demonstrate IOTGUARD on 20 flawed apps and find that IOTGUARD correctly enforces 12 of the 12 policy violations. In addition, we evaluate IOTGUARD on 35 SmartThings IoT and 30 IFTTT trigger-action platform market apps executed in a simulated smart home. IOTGUARD enforces 11 unique policies and blocks 16 states in six (17.1%) SmartThings and five (16.6%) IFTTT apps. IOTGUARD imposes only 17.3% runtime overhead on an app and 19.8% for five interacting apps. Through this effort, we introduce a rigorously grounded system for enforcing correct operation of IoT devices through systematically identified IoT policies, demonstrating the effectiveness and value of monitoring IoT apps with tools such as IOTGUARD.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89284063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 185
ExSpectre: Hiding Malware in Speculative Execution ExSpectre:在推测执行中隐藏恶意软件
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23409
Jack Wampler, Ian Martiny, Eric Wustrow
Recently, the Spectre and Meltdown attacks revealed serious vulnerabilities in modern CPU designs, allowing an attacker to exfiltrate data from sensitive programs. These vulnerabilities take advantage of speculative execution to coerce a processor to perform computation that would otherwise not occur, leaking the resulting information via side channels to an attacker. In this paper, we extend these ideas in a different direction, and leverage speculative execution in order to hide malware from both static and dynamic analysis. Using this technique, critical portions of a malicious program’s computation can be shielded from view, such that even a debugger following an instructionlevel trace of the program cannot tell how its results were computed. We introduce ExSpectre, which compiles arbitrary malicious code into a seemingly-benign payload binary. When a separate trigger program runs on the same machine, it mistrains the CPU’s branch predictor, causing the payload program to speculatively execute its malicious payload, which communicates speculative results back to the rest of the payload program to change its real-world behavior. We study the extent and types of execution that can be performed speculatively, and demonstrate several computations that can be performed covertly. In particular, within speculative execution we are able to decrypt memory using AES-NI instructions at over 11 kbps. Building on this, we decrypt and interpret a custom virtual machine language to perform arbitrary computation and system calls in the real world. We demonstrate this with a proof-of-concept dial back shell, which takes only a few milliseconds to execute after the trigger is issued. We also show how our corresponding trigger program can be a preexisting benign application already running on the system, and demonstrate this concept with OpenSSL driven remotely by the attacker as a trigger program. ExSpectre demonstrates a new kind of malware that evades existing reverse engineering and binary analysis techniques. Because its true functionality is contained in seemingly unreachable dead code, and its control flow driven externally by potentially any other program running at the same time, ExSpectre poses a novel threat to state-of-the-art malware analysis techniques.
最近,Spectre和Meltdown攻击暴露了现代CPU设计中的严重漏洞,允许攻击者从敏感程序中窃取数据。这些漏洞利用推测执行来强制处理器执行原本不会发生的计算,从而通过侧通道将结果信息泄露给攻击者。在本文中,我们在不同的方向上扩展了这些想法,并利用推测执行来隐藏恶意软件,使其不受静态和动态分析的影响。使用这种技术,可以屏蔽恶意程序计算的关键部分,这样即使是跟踪程序的指令级跟踪的调试器也无法知道其结果是如何计算的。我们介绍ExSpectre,它可以将任意恶意代码编译成看似无害的有效负载二进制文件。当一个单独的触发程序在同一台机器上运行时,它会破坏CPU的分支预测器,导致有效负载程序推测性地执行其恶意有效负载,这将推测结果传递回有效负载程序的其余部分,以改变其实际行为。我们研究了可以推测执行的执行范围和类型,并演示了几种可以秘密执行的计算。特别是,在推测执行中,我们能够使用AES-NI指令以超过11 kbps的速度解密内存。在此基础上,我们解密和解释自定义虚拟机语言,以便在现实世界中执行任意计算和系统调用。我们使用一个概念验证回拨shell来演示这一点,该shell在发出触发器后只需几毫秒即可执行。我们还展示了相应的触发程序如何可以是系统上已经运行的预先存在的良性应用程序,并通过攻击者远程驱动的OpenSSL作为触发程序演示了这一概念。ExSpectre展示了一种新的恶意软件,可以避开现有的逆向工程和二进制分析技术。由于ExSpectre的真正功能包含在看似无法访问的死代码中,并且其控制流可能由同时运行的任何其他程序外部驱动,因此ExSpectre对最先进的恶意软件分析技术构成了新的威胁。
{"title":"ExSpectre: Hiding Malware in Speculative Execution","authors":"Jack Wampler, Ian Martiny, Eric Wustrow","doi":"10.14722/ndss.2019.23409","DOIUrl":"https://doi.org/10.14722/ndss.2019.23409","url":null,"abstract":"Recently, the Spectre and Meltdown attacks revealed serious vulnerabilities in modern CPU designs, allowing an attacker to exfiltrate data from sensitive programs. These vulnerabilities take advantage of speculative execution to coerce a processor to perform computation that would otherwise not occur, leaking the resulting information via side channels to an attacker. In this paper, we extend these ideas in a different direction, and leverage speculative execution in order to hide malware from both static and dynamic analysis. Using this technique, critical portions of a malicious program’s computation can be shielded from view, such that even a debugger following an instructionlevel trace of the program cannot tell how its results were computed. We introduce ExSpectre, which compiles arbitrary malicious code into a seemingly-benign payload binary. When a separate trigger program runs on the same machine, it mistrains the CPU’s branch predictor, causing the payload program to speculatively execute its malicious payload, which communicates speculative results back to the rest of the payload program to change its real-world behavior. We study the extent and types of execution that can be performed speculatively, and demonstrate several computations that can be performed covertly. In particular, within speculative execution we are able to decrypt memory using AES-NI instructions at over 11 kbps. Building on this, we decrypt and interpret a custom virtual machine language to perform arbitrary computation and system calls in the real world. We demonstrate this with a proof-of-concept dial back shell, which takes only a few milliseconds to execute after the trigger is issued. We also show how our corresponding trigger program can be a preexisting benign application already running on the system, and demonstrate this concept with OpenSSL driven remotely by the attacker as a trigger program. ExSpectre demonstrates a new kind of malware that evades existing reverse engineering and binary analysis techniques. Because its true functionality is contained in seemingly unreachable dead code, and its control flow driven externally by potentially any other program running at the same time, ExSpectre poses a novel threat to state-of-the-art malware analysis techniques.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"117 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79461598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
maTLS: How to Make TLS middlebox-aware? 如何使TLS中间件感知?
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23547
Hyunwoo Lee, Zach Smith, Junghwan Lim, Gyeongjae Choi, Selin Chun, Taejoong Chung, T. Kwon
Middleboxes are widely deployed in order to enhance security and performance in networking. As communication over TLS becomes increasingly common, however, the end-to-end channel model of TLS undermines the efficacy of middleboxes. Existing solutions, such as ‘SplitTLS’, which intercepts TLS sessions, often introduce significant security risks by installing a custom root certificate or sharing a private key. Many studies have confirmed security vulnerabilities when combining TLS with middleboxes, which include certificate validation failures, use of obsolete ciphersuites, and unwanted content modification. To address the above issues, we introduce a middlebox-aware TLS protocol, dubbed maTLS, which allows middleboxes to participate in the TLS session in a visible and auditable fashion. Every participating middlebox now splits a session into two segments with their own security parameters in collaboration with the two endpoints. The maTLS protocol is designed to authenticate the middleboxes to verify the security parameters of segments, and to audit the middleboxes’ write operations. Thus, security of the session is ensured. We prove the security model of maTLS by using Tamarin, a state-of-theart security verification tool. We also carry out testbed-based experiments to show that maTLS achieves the above security goals with marginal overhead.
为了增强网络中的安全性和性能,中间件被广泛部署。然而,随着基于TLS的通信变得越来越普遍,TLS的端到端通道模型削弱了中间盒的有效性。现有的解决方案,如拦截TLS会话的“SplitTLS”,通常会通过安装自定义根证书或共享私钥来引入重大的安全风险。许多研究已经证实,在将TLS与中间件结合使用时存在安全漏洞,包括证书验证失败、使用过时的密码套件以及不需要的内容修改。为了解决上述问题,我们引入了一个中间件感知的TLS协议,称为maTLS,它允许中间件以可见和可审计的方式参与TLS会话。现在,每个参与的中间盒都使用自己的安全参数与两个端点协作,将会话分成两个段。maTLS协议主要用于对中间件进行身份验证,验证段的安全参数,并对中间件的写操作进行审计。从而保证了会话的安全性。我们利用Tamarin这个最先进的安全验证工具来证明maTLS的安全模型。我们还进行了基于测试平台的实验,以证明maTLS在边际开销下实现了上述安全目标。
{"title":"maTLS: How to Make TLS middlebox-aware?","authors":"Hyunwoo Lee, Zach Smith, Junghwan Lim, Gyeongjae Choi, Selin Chun, Taejoong Chung, T. Kwon","doi":"10.14722/ndss.2019.23547","DOIUrl":"https://doi.org/10.14722/ndss.2019.23547","url":null,"abstract":"Middleboxes are widely deployed in order to enhance security and performance in networking. As communication over TLS becomes increasingly common, however, the end-to-end channel model of TLS undermines the efficacy of middleboxes. Existing solutions, such as ‘SplitTLS’, which intercepts TLS sessions, often introduce significant security risks by installing a custom root certificate or sharing a private key. Many studies have confirmed security vulnerabilities when combining TLS with middleboxes, which include certificate validation failures, use of obsolete ciphersuites, and unwanted content modification. To address the above issues, we introduce a middlebox-aware TLS protocol, dubbed maTLS, which allows middleboxes to participate in the TLS session in a visible and auditable fashion. Every participating middlebox now splits a session into two segments with their own security parameters in collaboration with the two endpoints. The maTLS protocol is designed to authenticate the middleboxes to verify the security parameters of segments, and to audit the middleboxes’ write operations. Thus, security of the session is ensured. We prove the security model of maTLS by using Tamarin, a state-of-theart security verification tool. We also carry out testbed-based experiments to show that maTLS achieves the above security goals with marginal overhead.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89891685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries 在应用程序二进制文件中自动修补易受攻击的开源软件版本
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23126
Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee
Mobile application developers rely heavily on opensource software (OSS) to offload common functionalities such as the implementation of protocols and media format playback. Over the past years, several vulnerabilities have been found in popular open-source libraries like OpenSSL and FFmpeg. Mobile applications that include such libraries inherit these flaws, which make them vulnerable. Fortunately, the open-source community is responsive and patches are made available within days. However, mobile application developers are often left unaware of these flaws. The App Security Improvement Program (ASIP) is a commendable effort by Google to notify application developers of these flaws, but recent work has shown that many developers do not act on this information. Our work addresses vulnerable mobile applications through automatic binary patching from source patches provided by the OSS maintainers and without involving the developers. We propose novel techniques to overcome difficult challenges like patching feasibility analysis, source-code-to-binary-code matching, and in-memory patching. Our technique uses a novel variabilityaware approach, which we implement as OSSPATCHER. We evaluated OSSPATCHER with 39 OSS and a collection of 1,000 Android applications using their vulnerable versions. OSSPATCHER generated 675 function-level patches that fixed the affected mobile applications without breaking their binary code. Further, we evaluated 10 vulnerabilities in popular apps such as Chrome with public exploits, which OSSPATCHER was able to mitigate and thwart their exploitation.
移动应用程序开发人员严重依赖开源软件(OSS)来卸载诸如协议实现和媒体格式播放等常见功能。在过去的几年中,在OpenSSL和FFmpeg等流行的开源库中发现了一些漏洞。包含此类库的移动应用程序继承了这些缺陷,这使得它们容易受到攻击。幸运的是,开源社区反应迅速,补丁在几天内就可用了。然而,移动应用程序开发人员往往没有意识到这些缺陷。应用程序安全改进计划(ASIP)是谷歌值得称赞的一项努力,它向应用程序开发人员通报了这些漏洞,但最近的工作表明,许多开发人员并没有根据这些信息采取行动。我们的工作是通过从OSS维护者提供的源代码补丁中自动打二进制补丁来解决易受攻击的移动应用程序,而不涉及开发人员。我们提出了新的技术来克服一些困难的挑战,如补丁可行性分析、源代码到二进制代码匹配和内存补丁。我们的技术使用了一种新颖的可变性感知方法,我们将其实现为OSSPATCHER。我们用39个OSS和1000个Android应用程序的易受攻击版本对OSSPATCHER进行了评估。OSSPATCHER生成了675个功能级补丁,在不破坏二进制代码的情况下修复了受影响的移动应用程序。此外,我们评估了流行应用程序(如Chrome)中存在的10个公开漏洞,OSSPATCHER能够减轻并阻止这些漏洞的利用。
{"title":"Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries","authors":"Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee","doi":"10.14722/ndss.2019.23126","DOIUrl":"https://doi.org/10.14722/ndss.2019.23126","url":null,"abstract":"Mobile application developers rely heavily on opensource software (OSS) to offload common functionalities such as the implementation of protocols and media format playback. Over the past years, several vulnerabilities have been found in popular open-source libraries like OpenSSL and FFmpeg. Mobile applications that include such libraries inherit these flaws, which make them vulnerable. Fortunately, the open-source community is responsive and patches are made available within days. However, mobile application developers are often left unaware of these flaws. The App Security Improvement Program (ASIP) is a commendable effort by Google to notify application developers of these flaws, but recent work has shown that many developers do not act on this information. Our work addresses vulnerable mobile applications through automatic binary patching from source patches provided by the OSS maintainers and without involving the developers. We propose novel techniques to overcome difficult challenges like patching feasibility analysis, source-code-to-binary-code matching, and in-memory patching. Our technique uses a novel variabilityaware approach, which we implement as OSSPATCHER. We evaluated OSSPATCHER with 39 OSS and a collection of 1,000 Android applications using their vulnerable versions. OSSPATCHER generated 675 function-level patches that fixed the affected mobile applications without breaking their binary code. Further, we evaluated 10 vulnerabilities in popular apps such as Chrome with public exploits, which OSSPATCHER was able to mitigate and thwart their exploitation.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88284969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection 语音安全的关键:说话人合法性检测的大脑研究
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23206
Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt
A new generation of scams has emerged that uses voice impersonation to obtain sensitive information, eavesdrop over voice calls and extort money from unsuspecting human users. Research demonstrates that users are fallible to voice impersonation attacks that exploit the current advancement in speech synthesis. In this paper, we set out to elicit a deeper understanding of such human-centered “voice hacking” based on a neuro-scientific methodology (thereby corroborating and expanding the traditional behavioral-only approach in significant ways). Specifically, we investigate the neural underpinnings of voice security through functional near-infrared spectroscopy (fNIRS), a cutting-edge neuroimaging technique, that captures neural signals in both temporal and spatial domains. We design and conduct an fNIRS study to pursue a thorough investigation of users’ mental processing related to speaker legitimacy detection – whether a voice sample is rendered by a target speaker, a different other human speaker or a synthesizer mimicking the speaker. We analyze the neural activity associated within this task as well as the brain areas that may control such activity. Our key insight is that there may be no statistically significant differences in the way the human brain processes the legitimate speakers vs. synthesized speakers, whereas clear differences are visible when encountering legitimate vs. different other human speakers. This finding may help to explain users’ susceptibility to synthesized attacks, as seen from the behavioral self-reported analysis. That is, the impersonated synthesized voices may seem indistinguishable from the real voices in terms of both behavioral and neural perspectives. In sharp contrast, prior studies showed subconscious neural differences in other real vs. fake artifacts (e.g., paintings and websites), despite users failing to note these differences behaviorally. Overall, our work dissects the fundamental neural patterns underlying voice-based insecurity and reveals users’ susceptibility to voice synthesis attacks at a biological level. We believe that this could be a significant insight for the security community suggesting that the human detection of voice synthesis attacks may not improve over time, especially given that voice synthesis techniques will likely continue to improve, calling for the design of careful machine-assisted techniques to help humans counter these attacks. *Work done while being a student at UAB
新一代的骗局已经出现,他们利用语音冒充来获取敏感信息,窃听语音通话,并从毫无戒心的人类用户那里勒索钱财。研究表明,用户很容易受到语音模仿攻击,这种攻击利用了当前语音合成的进步。在本文中,我们开始基于神经科学方法对这种以人为中心的“语音黑客”进行更深入的理解(从而在重要方面证实和扩展了传统的仅行为方法)。具体来说,我们通过功能近红外光谱(fNIRS)研究语音安全的神经基础,fNIRS是一种尖端的神经成像技术,可以捕获时间和空间域的神经信号。我们设计并进行了一项fNIRS研究,以对用户与说话者合法性检测相关的心理处理进行彻底调查-无论语音样本是由目标说话者,其他不同的人类说话者还是模仿说话者的合成器呈现的。我们分析了与这项任务相关的神经活动,以及可能控制这种活动的大脑区域。我们的关键观点是,人脑处理合法说话人和合成说话人的方式在统计上可能没有显著差异,而在遇到合法说话人和其他不同的人说话人时,差异是明显的。从行为自我报告分析中可以看出,这一发现可能有助于解释用户对综合攻击的敏感性。也就是说,从行为和神经角度来看,模仿的合成声音似乎与真实的声音没有区别。与此形成鲜明对比的是,之前的研究表明,在其他真实与虚假的人工制品(如绘画和网站)中,潜意识神经系统存在差异,尽管用户在行为上没有注意到这些差异。总的来说,我们的工作剖析了基于语音的不安全的基本神经模式,并揭示了用户在生物水平上对语音合成攻击的易感性。我们认为,这可能是安全社区的一个重要见解,表明人类对语音合成攻击的检测可能不会随着时间的推移而改善,特别是考虑到语音合成技术可能会继续改进,这需要设计仔细的机器辅助技术来帮助人类对抗这些攻击。*在UAB学习期间完成的工作
{"title":"The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection","authors":"Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt","doi":"10.14722/ndss.2019.23206","DOIUrl":"https://doi.org/10.14722/ndss.2019.23206","url":null,"abstract":"A new generation of scams has emerged that uses voice impersonation to obtain sensitive information, eavesdrop over voice calls and extort money from unsuspecting human users. Research demonstrates that users are fallible to voice impersonation attacks that exploit the current advancement in speech synthesis. In this paper, we set out to elicit a deeper understanding of such human-centered “voice hacking” based on a neuro-scientific methodology (thereby corroborating and expanding the traditional behavioral-only approach in significant ways). Specifically, we investigate the neural underpinnings of voice security through functional near-infrared spectroscopy (fNIRS), a cutting-edge neuroimaging technique, that captures neural signals in both temporal and spatial domains. We design and conduct an fNIRS study to pursue a thorough investigation of users’ mental processing related to speaker legitimacy detection – whether a voice sample is rendered by a target speaker, a different other human speaker or a synthesizer mimicking the speaker. We analyze the neural activity associated within this task as well as the brain areas that may control such activity. Our key insight is that there may be no statistically significant differences in the way the human brain processes the legitimate speakers vs. synthesized speakers, whereas clear differences are visible when encountering legitimate vs. different other human speakers. This finding may help to explain users’ susceptibility to synthesized attacks, as seen from the behavioral self-reported analysis. That is, the impersonated synthesized voices may seem indistinguishable from the real voices in terms of both behavioral and neural perspectives. In sharp contrast, prior studies showed subconscious neural differences in other real vs. fake artifacts (e.g., paintings and websites), despite users failing to note these differences behaviorally. Overall, our work dissects the fundamental neural patterns underlying voice-based insecurity and reveals users’ susceptibility to voice synthesis attacks at a biological level. We believe that this could be a significant insight for the security community suggesting that the human detection of voice synthesis attacks may not improve over time, especially given that voice synthesis techniques will likely continue to improve, calling for the design of careful machine-assisted techniques to help humans counter these attacks. *Work done while being a student at UAB","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77361276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Countering Malicious Processes with Process-DNS Association 利用进程- dns关联对抗恶意进程
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23012
Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, C. Lumezanu, Zhenyu Wu, L. Tang, Ding Li
{"title":"Countering Malicious Processes with Process-DNS Association","authors":"Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, C. Lumezanu, Zhenyu Wu, L. Tang, Ding Li","doi":"10.14722/ndss.2019.23012","DOIUrl":"https://doi.org/10.14722/ndss.2019.23012","url":null,"abstract":"","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87160128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Statistical Privacy for Streaming Traffic 流媒体流量的统计隐私
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23210
Xiaokuan Zhang, Jihun Hamm, M. Reiter, Yinqian Zhang
Machine learning empowers traffic-analysis attacks that breach users’ privacy from their encrypted traffic. Recent advances in deep learning drastically escalate such threats. One prominent example demonstrated recently is a traffic-analysis attack against video streaming by using convolutional neural networks. In this paper, we explore the adaption of techniques previously used in the domains of adversarial machine learning and differential privacy to mitigate the machine-learning-powered analysis of streaming traffic. Our findings are twofold. First, constructing adversarial samples effectively confounds an adversary with a predetermined classifier but is less effective when the adversary can adapt to the defense by using alternative classifiers or training the classifier with adversarial samples. Second, differential-privacy guarantees are very effective against such statistical-inference-based traffic analysis, while remaining agnostic to the machine learning classifiers used by the adversary. We propose two mechanisms for enforcing differential privacy for encrypted streaming traffic, and evaluate their security and utility. Our empirical implementation and evaluation suggest that the proposed statistical privacy approaches are promising solutions in the underlying scenarios.
机器学习使流量分析攻击能够从加密的流量中泄露用户的隐私。深度学习的最新进展极大地加剧了这种威胁。最近展示的一个突出的例子是使用卷积神经网络对视频流进行流量分析攻击。在本文中,我们探索了以前在对抗性机器学习和差分隐私领域使用的技术的适应性,以减轻机器学习驱动的流流量分析。我们的发现是双重的。首先,构建对抗性样本有效地将对手与预定分类器混淆,但当对手可以通过使用替代分类器或使用对抗性样本训练分类器来适应防御时,效果较差。其次,差分隐私保证对这种基于统计推断的流量分析非常有效,同时对对手使用的机器学习分类器保持不可知。我们提出了两种机制来强制加密流流量的差异隐私,并评估了它们的安全性和实用性。我们的实证实施和评估表明,提出的统计隐私方法在潜在场景中是有希望的解决方案。
{"title":"Statistical Privacy for Streaming Traffic","authors":"Xiaokuan Zhang, Jihun Hamm, M. Reiter, Yinqian Zhang","doi":"10.14722/ndss.2019.23210","DOIUrl":"https://doi.org/10.14722/ndss.2019.23210","url":null,"abstract":"Machine learning empowers traffic-analysis attacks that breach users’ privacy from their encrypted traffic. Recent advances in deep learning drastically escalate such threats. One prominent example demonstrated recently is a traffic-analysis attack against video streaming by using convolutional neural networks. In this paper, we explore the adaption of techniques previously used in the domains of adversarial machine learning and differential privacy to mitigate the machine-learning-powered analysis of streaming traffic. Our findings are twofold. First, constructing adversarial samples effectively confounds an adversary with a predetermined classifier but is less effective when the adversary can adapt to the defense by using alternative classifiers or training the classifier with adversarial samples. Second, differential-privacy guarantees are very effective against such statistical-inference-based traffic analysis, while remaining agnostic to the machine learning classifiers used by the adversary. We propose two mechanisms for enforcing differential privacy for encrypted streaming traffic, and evaluate their security and utility. Our empirical implementation and evaluation suggest that the proposed statistical privacy approaches are promising solutions in the underlying scenarios.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91204376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
The use of TLS in Censorship Circumvention TLS在审查规避中的使用
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23511
Sergey Frolov, Eric Wustrow
TLS, the Transport Layer Security protocol, has quickly become the most popular protocol on the Internet, already used to load over 70% of web pages in Mozilla Firefox. Due to its ubiquity, TLS is also a popular protocol for censorship circumvention tools, including Tor and Signal, among others. However, the wide range of features supported in TLS makes it possible to distinguish implementations from one another by what set of cipher suites, elliptic curves, signature algorithms, and other extensions they support. Already, censors have used deep packet inspection (DPI) to identify and block popular circumvention tools based on the fingerprint of their TLS implementation. In response, many circumvention tools have attempted to mimic popular TLS implementations such as browsers, but this technique has several challenges. First, it is burdensome to keep up with the rapidly-changing browser TLS implementations, and know what fingerprints would be good candidates to mimic. Second, TLS implementations can be difficult to mimic correctly, as they offer many features that may not be supported by the relatively lightweight libraries used in typical circumvention tools. Finally, dependency changes and updates to the underlying libraries can silently impact what an application’s TLS fingerprint looks like, making it difficult for tool maintainers to keep up. In this paper, we collect and analyze real-world TLS traffic from over 11.8 billion TLS connections over 9 months to identify a wide range of TLS client implementations actually used on the Internet. We use our data to analyze TLS implementations of several popular censorship circumvention tools, including Lantern, Psiphon, Signal, Outline, TapDance, and Tor (Snowflake and meek pluggable transports). We find that the many of these tools use TLS configurations that are easily distinguishable from the real-world traffic they attempt to mimic, even when these tools have put effort into parroting popular TLS implementations. To address this problem, we have developed a library, uTLS, that enables tool maintainers to automatically mimic other popular TLS implementations. Using our real-world traffic dataset, we observe many popular TLS implementations we are able to correctly mimic with uTLS, and we describe ways our tool can more flexibly adapt to the dynamic TLS ecosystem with minimal manual effort.
TLS,即传输层安全协议,已经迅速成为互联网上最流行的协议,已经用于加载Mozilla Firefox中超过70%的网页。由于其无处不在,TLS也是审查规避工具的流行协议,包括Tor和Signal等。然而,TLS所支持的广泛特性使得通过它们所支持的密码套件、椭圆曲线、签名算法和其他扩展集来区分实现成为可能。审查者已经使用深度包检测(DPI)来识别和阻止基于其TLS实现指纹的流行翻墙工具。作为回应,许多翻墙工具试图模仿流行的TLS实现(如浏览器),但是这种技术有几个挑战。首先,要跟上快速变化的浏览器TLS实现,并知道哪些指纹是很好的模仿对象,这是一项繁重的工作。其次,TLS实现很难正确模拟,因为它们提供的许多特性可能不被典型规避工具中使用的相对轻量级库所支持。最后,对底层库的依赖项更改和更新可能会悄悄地影响应用程序的TLS指纹,使工具维护人员难以跟上。在本文中,我们在9个月的时间里收集和分析了118亿TLS连接的真实TLS流量,以确定在互联网上实际使用的广泛的TLS客户端实现。我们使用我们的数据来分析几种流行的审查规避工具的TLS实现,包括Lantern, Psiphon, Signal, Outline, TapDance和Tor (Snowflake和meek可插拔传输)。我们发现,这些工具中的许多都使用TLS配置,这些配置很容易与它们试图模仿的真实流量区分开来,即使这些工具已经努力模仿流行的TLS实现。为了解决这个问题,我们开发了一个库uTLS,它使工具维护者能够自动模拟其他流行的TLS实现。使用我们的真实世界流量数据集,我们观察了许多流行的TLS实现,我们能够用uTLS正确地模拟,并且我们描述了我们的工具可以更灵活地适应动态TLS生态系统的方法,只需最少的手工工作。
{"title":"The use of TLS in Censorship Circumvention","authors":"Sergey Frolov, Eric Wustrow","doi":"10.14722/ndss.2019.23511","DOIUrl":"https://doi.org/10.14722/ndss.2019.23511","url":null,"abstract":"TLS, the Transport Layer Security protocol, has quickly become the most popular protocol on the Internet, already used to load over 70% of web pages in Mozilla Firefox. Due to its ubiquity, TLS is also a popular protocol for censorship circumvention tools, including Tor and Signal, among others. However, the wide range of features supported in TLS makes it possible to distinguish implementations from one another by what set of cipher suites, elliptic curves, signature algorithms, and other extensions they support. Already, censors have used deep packet inspection (DPI) to identify and block popular circumvention tools based on the fingerprint of their TLS implementation. In response, many circumvention tools have attempted to mimic popular TLS implementations such as browsers, but this technique has several challenges. First, it is burdensome to keep up with the rapidly-changing browser TLS implementations, and know what fingerprints would be good candidates to mimic. Second, TLS implementations can be difficult to mimic correctly, as they offer many features that may not be supported by the relatively lightweight libraries used in typical circumvention tools. Finally, dependency changes and updates to the underlying libraries can silently impact what an application’s TLS fingerprint looks like, making it difficult for tool maintainers to keep up. In this paper, we collect and analyze real-world TLS traffic from over 11.8 billion TLS connections over 9 months to identify a wide range of TLS client implementations actually used on the Internet. We use our data to analyze TLS implementations of several popular censorship circumvention tools, including Lantern, Psiphon, Signal, Outline, TapDance, and Tor (Snowflake and meek pluggable transports). We find that the many of these tools use TLS configurations that are easily distinguishable from the real-world traffic they attempt to mimic, even when these tools have put effort into parroting popular TLS implementations. To address this problem, we have developed a library, uTLS, that enables tool maintainers to automatically mimic other popular TLS implementations. Using our real-world traffic dataset, we observe many popular TLS implementations we are able to correctly mimic with uTLS, and we describe ways our tool can more flexibly adapt to the dynamic TLS ecosystem with minimal manual effort.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86582308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers 将状态赋予无状态:用分类账增强可信计算
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23060
Gabriel Kaptchuk, M. Green, Ian Miers
In this work we investigate new computational properties that can be achieved by combining stateless trusted devices with public ledgers. We consider a hybrid paradigm in which a client-side device (such as a co-processor or trusted enclave) performs secure computation, while interacting with a public ledger via a possibly malicious host computer. We explore both the constructive and potentially destructive implications of such systems. We first show that this combination allows for the construction of stateful interactive functionalities (including general computation) even when the device has no persistent storage; this allows us to build sophisticated applications using inexpensive trusted hardware or even pure cryptographic obfuscation techniques. We further show how to use this paradigm to achieve censorship-resistant communication with a network, even when network communications are mediated by a potentially malicious host. Finally we describe a number of practical applications that can be achieved today. These include the synchronization of private smart contracts; rate limited mandatory logging; strong encrypted backups from weak passwords; enforcing fairness in multi-party computation; and destructive applications such as autonomous ransomware, which allows for payments without an online party.
在这项工作中,我们研究了通过将无状态可信设备与公共分类账相结合可以实现的新的计算属性。我们考虑了一种混合范例,其中客户端设备(例如协处理器或可信enclave)执行安全计算,同时通过可能是恶意的主机与公共分类账进行交互。我们探讨了这些系统的建设性和潜在的破坏性影响。我们首先表明,即使设备没有持久存储,这种组合也允许构建有状态交互功能(包括一般计算);这使我们能够使用廉价的可信硬件甚至纯加密混淆技术构建复杂的应用程序。我们进一步展示了如何使用此范式来实现与网络的抗审查通信,即使网络通信由潜在的恶意主机介导。最后,我们描述了今天可以实现的一些实际应用。其中包括私有智能合约的同步;速率限制的强制记录;从弱密码强加密备份;加强多方计算的公平性;破坏性的应用程序,如自主勒索软件,允许在没有在线方的情况下进行支付。
{"title":"Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers","authors":"Gabriel Kaptchuk, M. Green, Ian Miers","doi":"10.14722/ndss.2019.23060","DOIUrl":"https://doi.org/10.14722/ndss.2019.23060","url":null,"abstract":"In this work we investigate new computational properties that can be achieved by combining stateless trusted devices with public ledgers. We consider a hybrid paradigm in which a client-side device (such as a co-processor or trusted enclave) performs secure computation, while interacting with a public ledger via a possibly malicious host computer. We explore both the constructive and potentially destructive implications of such systems. We first show that this combination allows for the construction of stateful interactive functionalities (including general computation) even when the device has no persistent storage; this allows us to build sophisticated applications using inexpensive trusted hardware or even pure cryptographic obfuscation techniques. We further show how to use this paradigm to achieve censorship-resistant communication with a network, even when network communications are mediated by a potentially malicious host. Finally we describe a number of practical applications that can be achieved today. These include the synchronization of private smart contracts; rate limited mandatory logging; strong encrypted backups from weak passwords; enforcing fairness in multi-party computation; and destructive applications such as autonomous ransomware, which allows for payments without an online party.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81000259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX OBFUSCURO:基于英特尔SGX的商品混淆引擎
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23513
Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, I. Shin, Byoungyoung Lee
Program obfuscation is a popular cryptographic construct with a wide range of uses such as IP theft prevention. Although cryptographic solutions for program obfuscation impose impractically high overheads, a recent breakthrough in systematically leveraging trusted hardware has shown promise. However, the existing solution is based on special-purpose trusted hardware, restricting its use-cases to a limited few. In this paper, we first study if such obfuscation is feasible based on commodity trusted hardware, Intel SGX, and we observe that certain important security considerations are not afforded by commodity hardware. In particular, we found that existing obfuscation/obliviousness schemes are insecure if directly applied to the SGX environment mainly due to the side-channel limitations. To this end, we present OBFSCURO, the first system providing program obfuscation using commodity trusted hardware, Intel SGX. The key idea is to leverage ORAMbased operations to perform secure code execution and data access. Initially, OBFSCURO transforms the regular program layout into a side-channel-secure and ORAM-compatible layout. Then, OBFSCURO ensures that its ORAM controller always performs data oblivious accesses in order to protect itself from the side-channel attacks. Furthermore, OBFSCURO ensures that the program is secure from timing-based attacks by ensuring that the program always runs for a pre-configured time interval. Along the way, OBFSCURO also introduces a systematic optimization such as register-based ORAM stash. We provide a thorough security analysis of OBFSCURO along with empirical attack evaluations showing that OBFSCURO can protect the SGX program execution from being leaked by access pattern-based and timing-based channels. We also provide a detailed performance benchmark results in order to show the practical aspects of OBFSCURO.
程序混淆是一种流行的加密结构,具有广泛的用途,如IP盗窃预防。尽管程序混淆的加密解决方案带来了不切实际的高开销,但最近在系统地利用可信硬件方面的突破显示出了希望。然而,现有的解决方案基于特殊用途的可信硬件,将其用例限制在有限的几个。在本文中,我们首先研究了基于商品可信硬件Intel SGX的这种混淆是否可行,并且我们观察到商品硬件不提供某些重要的安全考虑。特别是,我们发现现有的混淆/遗忘方案如果直接应用于SGX环境是不安全的,主要是由于侧信道限制。为此,我们提出了OBFSCURO,这是第一个使用商用可信硬件Intel SGX提供程序混淆的系统。关键思想是利用基于oram的操作来执行安全的代码执行和数据访问。最初,OBFSCURO将常规程序布局转换为侧通道安全和oram兼容的布局。然后,OBFSCURO确保其ORAM控制器始终执行数据无关访问,以保护自己免受侧信道攻击。此外,OBFSCURO通过确保程序总是在预先配置的时间间隔内运行,确保程序免受基于时间的攻击。在此过程中,OBFSCURO还引入了系统优化,例如基于寄存器的ORAM存储。我们对OBFSCURO进行了全面的安全分析,并进行了经验攻击评估,表明OBFSCURO可以保护SGX程序执行免受基于访问模式和基于时间的通道的泄漏。我们还提供了详细的性能基准测试结果,以展示OBFSCURO的实用方面。
{"title":"OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX","authors":"Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, I. Shin, Byoungyoung Lee","doi":"10.14722/ndss.2019.23513","DOIUrl":"https://doi.org/10.14722/ndss.2019.23513","url":null,"abstract":"Program obfuscation is a popular cryptographic construct with a wide range of uses such as IP theft prevention. Although cryptographic solutions for program obfuscation impose impractically high overheads, a recent breakthrough in systematically leveraging trusted hardware has shown promise. However, the existing solution is based on special-purpose trusted hardware, restricting its use-cases to a limited few. In this paper, we first study if such obfuscation is feasible based on commodity trusted hardware, Intel SGX, and we observe that certain important security considerations are not afforded by commodity hardware. In particular, we found that existing obfuscation/obliviousness schemes are insecure if directly applied to the SGX environment mainly due to the side-channel limitations. To this end, we present OBFSCURO, the first system providing program obfuscation using commodity trusted hardware, Intel SGX. The key idea is to leverage ORAMbased operations to perform secure code execution and data access. Initially, OBFSCURO transforms the regular program layout into a side-channel-secure and ORAM-compatible layout. Then, OBFSCURO ensures that its ORAM controller always performs data oblivious accesses in order to protect itself from the side-channel attacks. Furthermore, OBFSCURO ensures that the program is secure from timing-based attacks by ensuring that the program always runs for a pre-configured time interval. Along the way, OBFSCURO also introduces a systematic optimization such as register-based ORAM stash. We provide a thorough security analysis of OBFSCURO along with empirical attack evaluations showing that OBFSCURO can protect the SGX program execution from being leaked by access pattern-based and timing-based channels. We also provide a detailed performance benchmark results in order to show the practical aspects of OBFSCURO.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82022945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
Proceedings 2019 Network and Distributed System Security Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1