首页 > 最新文献

Proceedings 2019 Network and Distributed System Security Symposium最新文献

英文 中文
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices 你破坏的不是你崩溃的:模糊嵌入式设备的挑战
Pub Date : 2018-01-01 DOI: 10.14722/NDSS.2018.23166
Marius Muench, Jan Stijohann, F. Kargl, Aurélien Francillon, D. Balzarotti
—As networked embedded systems are becoming more ubiquitous, their security is becoming critical to our daily life. While manual or automated large scale analysis of those systems regularly uncover new vulnerabilities, the way those systems are analyzed follows often the same approaches used on desktop systems. More specifically, traditional testing approaches relies on observable crashes of a program, and binary instrumentation techniques are used to improve the detection of those faulty states. In this paper, we demonstrate that memory corruptions, a common class of security vulnerabilities, often result in different behavior on embedded devices than on desktop systems. In particular, on embedded devices, effects of memory corruption are often less visible. This reduces significantly the effectiveness of traditional dynamic testing techniques in general, and fuzzing in particular. Additionally, we analyze those differences in several categories of embedded devices and show the resulting impact on firmware analysis. We further describe and evaluate relatively simple heuristics which can be applied at run time (on an execution trace or in an emulator), during the analysis of an embedded device to detect previously undetected memory corruptions.
-随着网络嵌入式系统变得越来越普遍,其安全性对我们的日常生活至关重要。虽然对这些系统进行手动或自动化的大规模分析会定期发现新的漏洞,但分析这些系统的方法通常与桌面系统相同。更具体地说,传统的测试方法依赖于可观察到的程序崩溃,并且使用二进制检测技术来改进对这些错误状态的检测。在本文中,我们证明了内存损坏是一类常见的安全漏洞,通常会导致嵌入式设备上的行为与桌面系统上的行为不同。特别是在嵌入式设备上,内存损坏的影响通常不太明显。这大大降低了传统动态测试技术的有效性,特别是模糊测试。此外,我们分析了几类嵌入式设备中的这些差异,并显示了对固件分析的影响。我们进一步描述和评估相对简单的启发式方法,这些方法可以在运行时(在执行跟踪或模拟器中)应用于嵌入式设备的分析,以检测以前未检测到的内存损坏。
{"title":"What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices","authors":"Marius Muench, Jan Stijohann, F. Kargl, Aurélien Francillon, D. Balzarotti","doi":"10.14722/NDSS.2018.23166","DOIUrl":"https://doi.org/10.14722/NDSS.2018.23166","url":null,"abstract":"—As networked embedded systems are becoming more ubiquitous, their security is becoming critical to our daily life. While manual or automated large scale analysis of those systems regularly uncover new vulnerabilities, the way those systems are analyzed follows often the same approaches used on desktop systems. More specifically, traditional testing approaches relies on observable crashes of a program, and binary instrumentation techniques are used to improve the detection of those faulty states. In this paper, we demonstrate that memory corruptions, a common class of security vulnerabilities, often result in different behavior on embedded devices than on desktop systems. In particular, on embedded devices, effects of memory corruption are often less visible. This reduces significantly the effectiveness of traditional dynamic testing techniques in general, and fuzzing in particular. Additionally, we analyze those differences in several categories of embedded devices and show the resulting impact on firmware analysis. We further describe and evaluate relatively simple heuristics which can be applied at run time (on an execution trace or in an emulator), during the analysis of an embedded device to detect previously undetected memory corruptions.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 160
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis 通过差异分析实现移动应用的模糊弹性隐私泄漏检测
Pub Date : 2017-02-01 DOI: 10.14722/NDSS.2017.23465
Andrea Continella, Y. Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Krügel, G. Vigna
Mobile apps are notorious for collecting a wealth of private information from users. Despite significant effort from the research community in developing privacy leak detection tools based on data flow tracking inside the app or through network traffic analysis, it is still unclear whether apps and ad libraries can hide the fact that they are leaking private information. In fact, all existing analysis tools have limitations: data flow tracking suffers from imprecisions that cause false positives, as well as false negatives when the data flow from a source of private information to a network sink is interrupted; on the other hand, network traffic analysis cannot handle encryption or custom encoding. We propose a new approach to privacy leak detection that is not affected by such limitations, and it is also resilient to obfuscation techniques, such as encoding, formatting, encryption, or any other kind of transformation performed on private information before it is leaked. Our work is based on blackbox differential analysis, and it works in two steps: first, it establishes a baseline of the network behavior of an app; then, it modifies sources of private information, such as the device ID and location, and detects leaks by observing deviations in the resulting network traffic. The basic concept of black-box differential analysis is not novel, but, unfortunately, it is not practical enough to precisely analyze modern mobile apps. In fact, their network traffic contains many sources of non-determinism, such as random identifiers, timestamps, and server-assigned session identifiers, which, when not handled properly, cause too much noise to correlate output changes with input changes. The main contribution of this work is to make black-box differential analysis practical when applied to modern Android apps. In particular, we show that the network-based non-determinism can often be explained and eliminated, and it is thus possible to reliably use variations in the network traffic as a strong signal to detect privacy leaks. We implemented this approach in a tool, called AGRIGENTO, and we evaluated it on more than one thousand Android apps. Our evaluation shows that our approach works well in practice and outperforms current state-of-the-art techniques. We conclude our study by discussing several case studies that show how popular apps and ad libraries currently exfiltrate data by using complex combinations of encoding and encryption mechanisms that other approaches fail to detect. Our results show that these apps and libraries seem to deliberately hide their data leaks from current approaches and clearly demonstrate the need for an obfuscation-resilient approach such as ours.
手机应用程序因收集用户大量私人信息而臭名昭著。尽管研究界在开发基于应用内部数据流跟踪或网络流量分析的隐私泄漏检测工具方面做出了巨大努力,但应用程序和广告库是否能够隐藏它们泄露隐私信息的事实仍不清楚。事实上,所有现有的分析工具都有局限性:数据流跟踪存在导致误报的不精确性,以及当从私有信息源到网络接收器的数据流中断时的误报;另一方面,网络流量分析不能处理加密或自定义编码。我们提出了一种新的隐私泄漏检测方法,该方法不受这些限制的影响,并且它也能够适应混淆技术,例如编码、格式化、加密或在泄漏之前对私有信息执行的任何其他类型的转换。我们的工作是基于黑盒差异分析,它分两步工作:首先,它建立一个应用程序的网络行为基线;然后,它修改私人信息的来源,如设备ID和位置,并通过观察由此产生的网络流量的偏差来检测泄漏。黑盒差分分析的基本概念并不新颖,但不幸的是,它不足以精确分析现代移动应用程序。事实上,它们的网络流量包含许多不确定性的来源,例如随机标识符、时间戳和服务器分配的会话标识符,如果处理不当,会导致过多的噪声,无法将输出更改与输入更改关联起来。这项工作的主要贡献是使黑盒差分分析在应用于现代Android应用程序时变得实用。特别是,我们表明基于网络的非确定性通常可以被解释和消除,因此可以可靠地使用网络流量的变化作为强信号来检测隐私泄漏。我们在一个名为AGRIGENTO的工具中实现了这一方法,并在1000多个Android应用程序上进行了评估。我们的评估表明,我们的方法在实践中效果良好,优于目前最先进的技术。我们通过讨论几个案例研究来总结我们的研究,这些案例研究表明,目前流行的应用程序和广告库是如何通过使用其他方法无法检测到的复杂编码和加密机制组合来泄露数据的。我们的研究结果表明,这些应用程序和库似乎故意隐藏当前方法的数据泄漏,并清楚地表明需要像我们这样的抗混淆方法。
{"title":"Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis","authors":"Andrea Continella, Y. Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Krügel, G. Vigna","doi":"10.14722/NDSS.2017.23465","DOIUrl":"https://doi.org/10.14722/NDSS.2017.23465","url":null,"abstract":"Mobile apps are notorious for collecting a wealth of private information from users. Despite significant effort from the research community in developing privacy leak detection tools based on data flow tracking inside the app or through network traffic analysis, it is still unclear whether apps and ad libraries can hide the fact that they are leaking private information. In fact, all existing analysis tools have limitations: data flow tracking suffers from imprecisions that cause false positives, as well as false negatives when the data flow from a source of private information to a network sink is interrupted; on the other hand, network traffic analysis cannot handle encryption or custom encoding. We propose a new approach to privacy leak detection that is not affected by such limitations, and it is also resilient to obfuscation techniques, such as encoding, formatting, encryption, or any other kind of transformation performed on private information before it is leaked. Our work is based on blackbox differential analysis, and it works in two steps: first, it establishes a baseline of the network behavior of an app; then, it modifies sources of private information, such as the device ID and location, and detects leaks by observing deviations in the resulting network traffic. The basic concept of black-box differential analysis is not novel, but, unfortunately, it is not practical enough to precisely analyze modern mobile apps. In fact, their network traffic contains many sources of non-determinism, such as random identifiers, timestamps, and server-assigned session identifiers, which, when not handled properly, cause too much noise to correlate output changes with input changes. The main contribution of this work is to make black-box differential analysis practical when applied to modern Android apps. In particular, we show that the network-based non-determinism can often be explained and eliminated, and it is thus possible to reliably use variations in the network traffic as a strong signal to detect privacy leaks. We implemented this approach in a tool, called AGRIGENTO, and we evaluated it on more than one thousand Android apps. Our evaluation shows that our approach works well in practice and outperforms current state-of-the-art techniques. We conclude our study by discussing several case studies that show how popular apps and ad libraries currently exfiltrate data by using complex combinations of encoding and encryption mechanisms that other approaches fail to detect. Our results show that these apps and libraries seem to deliberately hide their data leaks from current approaches and clearly demonstrate the need for an obfuscation-resilient approach such as ours.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"48 1","pages":"1-15"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91385584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis 互联网规模的CPS探测:推理、表征和编排分析
Pub Date : 2017-01-01 DOI: 10.14722/NDSS.2017.23149
Claude Fachkha, E. Bou-Harb, A. Keliris, N. Memon, M. Ahamad
Although the security of Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community, undoubtedly, there still exists a substantial lack of a comprehensive and a holistic understanding of attackers’ malicious strategies, aims and intentions. To this end, this paper uniquely exploits passive monitoring and analysis of a newly deployed network telescope IP address space in a first attempt ever to build broad notions of real CPS maliciousness. Specifically, we approach this problem by inferring, investigating, characterizing and reporting large-scale probing activities that specifically target more than 20 diverse, heavily employed CPS protocols. To permit such analysis, we initially devise and evaluate a novel probabilistic model that aims at filtering noise that is embedded in network telescope traffic. Subsequently, we generate amalgamated statistics, inferences and insights characterizing such inferred scanning activities in terms of their probe types, the distribution of their sources and their packets’ headers, among numerous others, in addition to examining and visualizing the co-occurrence patterns of such events. Further, we propose and empirically evaluate an innovative hybrid approach rooted in time-series analysis and context triggered piecewise hashing to infer, characterize and cluster orchestrated and well-coordinated probing activities targeting CPS protocols, which are generated from Internet-scale unsolicited sources. Our analysis and evaluations, which draw upon extensive network telescope data observed over a recent one month period, demonstrate a staggering 33 thousand probes towards ample of CPS protocols, the lack of interest in UDP-based CPS services, and the prevalence of probes towards the ICCP and Modbus protocols. Additionally, we infer a considerable 74% of CPS probes that were persistent throughout the entire analyzed period targeting prominent protocols such as DNP3 and BACnet. Further, we uncover close to 9 thousand large-scale, stealthy, previously undocumented orchestrated probing events targeting a number of such CPS protocols. We validate the various outcomes through cross-validations against publicly available threat repositories. We concur that the devised approaches, techniques, and methods provide a solid first step towards better comprehending real CPS unsolicited objectives and intents.
虽然网络物理系统(CPS)的安全性最近受到了研究界的极大关注,但毫无疑问,对攻击者的恶意策略、目的和意图仍然缺乏全面和全面的理解。为此,本文独特地利用了对新部署的网络望远镜IP地址空间的被动监控和分析,首次尝试构建真正的CPS恶意的广泛概念。具体来说,我们通过推断、调查、描述和报告大规模探测活动来解决这个问题,这些活动专门针对20多个不同的、大量使用的CPS协议。为了允许这样的分析,我们最初设计并评估了一种新的概率模型,旨在过滤嵌入在网络望远镜流量中的噪声。随后,除了检查和可视化这些事件的共现模式外,我们还根据探针类型、源分布和包头等众多因素,生成综合统计数据、推断和见解,以表征这些推断扫描活动。此外,我们提出并实证评估了一种基于时间序列分析和上下文触发的分段散列的创新混合方法,以推断、表征和集群针对CPS协议的精心策划和协调良好的探测活动,这些活动来自互联网规模的主动来源。我们的分析和评估利用了最近一个月期间观察到的广泛的网络望远镜数据,显示了惊人的3.3万个对CPS协议的探测,对基于udp的CPS服务缺乏兴趣,以及对ICCP和Modbus协议的探测的流行。此外,我们推断有相当多的74%的CPS探针在整个分析期间持续存在,目标是DNP3和BACnet等重要协议。此外,我们发现了近9000个大规模的、隐蔽的、以前没有记录的、针对许多此类CPS协议的精心策划的探测事件。我们通过对公开可用的威胁存储库进行交叉验证来验证各种结果。我们同意所设计的方法、技术和方法为更好地理解真正的CPS主动目标和意图提供了坚实的第一步。
{"title":"Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis","authors":"Claude Fachkha, E. Bou-Harb, A. Keliris, N. Memon, M. Ahamad","doi":"10.14722/NDSS.2017.23149","DOIUrl":"https://doi.org/10.14722/NDSS.2017.23149","url":null,"abstract":"Although the security of Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community, undoubtedly, there still exists a substantial lack of a comprehensive and a holistic understanding of attackers’ malicious strategies, aims and intentions. To this end, this paper uniquely exploits passive monitoring and analysis of a newly deployed network telescope IP address space in a first attempt ever to build broad notions of real CPS maliciousness. Specifically, we approach this problem by inferring, investigating, characterizing and reporting large-scale probing activities that specifically target more than 20 diverse, heavily employed CPS protocols. To permit such analysis, we initially devise and evaluate a novel probabilistic model that aims at filtering noise that is embedded in network telescope traffic. Subsequently, we generate amalgamated statistics, inferences and insights characterizing such inferred scanning activities in terms of their probe types, the distribution of their sources and their packets’ headers, among numerous others, in addition to examining and visualizing the co-occurrence patterns of such events. Further, we propose and empirically evaluate an innovative hybrid approach rooted in time-series analysis and context triggered piecewise hashing to infer, characterize and cluster orchestrated and well-coordinated probing activities targeting CPS protocols, which are generated from Internet-scale unsolicited sources. Our analysis and evaluations, which draw upon extensive network telescope data observed over a recent one month period, demonstrate a staggering 33 thousand probes towards ample of CPS protocols, the lack of interest in UDP-based CPS services, and the prevalence of probes towards the ICCP and Modbus protocols. Additionally, we infer a considerable 74% of CPS probes that were persistent throughout the entire analyzed period targeting prominent protocols such as DNP3 and BACnet. Further, we uncover close to 9 thousand large-scale, stealthy, previously undocumented orchestrated probing events targeting a number of such CPS protocols. We validate the various outcomes through cross-validations against publicly available threat repositories. We concur that the devised approaches, techniques, and methods provide a solid first step towards better comprehending real CPS unsolicited objectives and intents.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Copker: Computing with Private Keys without RAM Copker:没有RAM的私钥计算
Pub Date : 2014-01-01 DOI: 10.14722/NDSS.2014.23125
Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing
Cryptographic systems are essential for computer and communication security, for instance, RSA is used in PGP Email clients and AES is employed in full disk encryption. In practice, the cryptographic keys are loaded and stored in RAM as plain-text, and therefore vulnerable to physical memory attacks (e.g., cold-boot attacks). To tackle this problem, we propose Copker, which implements asymmetric cryptosystems entirely within the CPU, without storing plain-text private keys in the RAM. In its active mode, Copker stores kilobytes of sensitive data, including the private key and the intermediate states, only in onchip CPU caches (and registers). Decryption/signing operations are performed without storing sensitive information in system memory. In the suspend mode, Copker stores symmetrically encrypted private keys in memory, while employs existing solutions to keep the key-encryption key securely in CPU registers. Hence, Copker releases the system resources in the suspend mode. In this paper, we implement Copker with the most common asymmetric cryptosystem, RSA, with the support of multiple private keys. We show that Copker provides decryption/signing services that are secure against physical memory attacks. Meanwhile, with intensive experiments, we demonstrate that our implementation of Copker is secure and requires reasonable overhead. Keywords—Cache-as-RAM; cold-boot attack; key management; asymmetric cryptography implementation.
密码系统对计算机和通信安全至关重要,例如,RSA用于PGP电子邮件客户端,AES用于全磁盘加密。在实践中,加密密钥以明文形式加载并存储在RAM中,因此容易受到物理内存攻击(例如,冷启动攻击)。为了解决这个问题,我们提出了Copker,它完全在CPU内实现非对称密码系统,而不将明文私钥存储在RAM中。在主动模式下,Copker仅在片上CPU缓存(和寄存器)中存储数千字节的敏感数据,包括私钥和中间状态。执行解密/签名操作时,不会将敏感信息存储在系统内存中。在挂起模式下,Copker将对称加密的私钥存储在内存中,同时采用现有的解决方案将密钥加密密钥安全地保存在CPU寄存器中。因此,Copker以挂起模式释放系统资源。本文在多私钥的支持下,利用最常用的非对称密码系统RSA实现了Copker。我们展示了Copker提供的解密/签名服务对物理内存攻击是安全的。同时,通过大量的实验,我们证明了我们的Copker实现是安全的,并且需要合理的开销。Keywords-Cache-as-RAM;冷启动攻击;密钥管理;非对称加密实现。
{"title":"Copker: Computing with Private Keys without RAM","authors":"Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing","doi":"10.14722/NDSS.2014.23125","DOIUrl":"https://doi.org/10.14722/NDSS.2014.23125","url":null,"abstract":"Cryptographic systems are essential for computer and communication security, for instance, RSA is used in PGP Email clients and AES is employed in full disk encryption. In practice, the cryptographic keys are loaded and stored in RAM as plain-text, and therefore vulnerable to physical memory attacks (e.g., cold-boot attacks). To tackle this problem, we propose Copker, which implements asymmetric cryptosystems entirely within the CPU, without storing plain-text private keys in the RAM. In its active mode, Copker stores kilobytes of sensitive data, including the private key and the intermediate states, only in onchip CPU caches (and registers). Decryption/signing operations are performed without storing sensitive information in system memory. In the suspend mode, Copker stores symmetrically encrypted private keys in memory, while employs existing solutions to keep the key-encryption key securely in CPU registers. Hence, Copker releases the system resources in the suspend mode. In this paper, we implement Copker with the most common asymmetric cryptosystem, RSA, with the support of multiple private keys. We show that Copker provides decryption/signing services that are secure against physical memory attacks. Meanwhile, with intensive experiments, we demonstrate that our implementation of Copker is secure and requires reasonable overhead. Keywords—Cache-as-RAM; cold-boot attack; key management; asymmetric cryptography implementation.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks 安全调度:保护c++虚拟调用免受内存损坏攻击
Pub Date : 2014-01-01 DOI: 10.14722/NDSS.2014.23287
Dongseok Jang, Zachary Tatlock, Sorin Lerner
Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These attacks can hijack program control flow whenever a virtual method of a corrupted object is called, potentially allowing the attacker to gain complete control of the underlying system. In this paper we present SAFEDISPATCH, a novel defense to prevent such vtable hijacking by statically analyzing C++ programs and inserting sufficient runtime checks to ensure that control flow at virtual method call sites cannot be arbitrarily influenced by an attacker. We implemented SAFEDISPATCH as a Clang++/LLVM extension, used our enhanced compiler to build a vtable-safe version of the Google Chromium browser, and measured the performance overhead of our approach on popular browser benchmark suites. By carefully crafting a handful of optimizations, we were able to reduce average runtime overhead to just 2.1%.
一些防御措施增加了传统的低级攻击的成本,这些攻击会破坏控制数据,例如保存在堆栈上的返回地址,从而危及程序的执行。作为回应,有创意的攻击者已经开始利用编程错误来操纵指向c++对象的虚表或虚表的指针,从而绕过这些防御。这些攻击可以在调用损坏对象的虚拟方法时劫持程序控制流,从而可能使攻击者获得对底层系统的完全控制。在本文中,我们提出了SAFEDISPATCH,这是一种新的防御方法,通过静态分析c++程序和插入足够的运行时检查来防止虚函数表劫持,以确保虚拟方法调用站点的控制流不会受到攻击者的任意影响。我们将SAFEDISPATCH实现为clang++ /LLVM扩展,使用我们增强的编译器构建一个vtable安全版本的Google Chromium浏览器,并在流行的浏览器基准套件上测量我们的方法的性能开销。通过精心制作一些优化,我们能够将平均运行时开销降低到2.1%。
{"title":"SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks","authors":"Dongseok Jang, Zachary Tatlock, Sorin Lerner","doi":"10.14722/NDSS.2014.23287","DOIUrl":"https://doi.org/10.14722/NDSS.2014.23287","url":null,"abstract":"Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These attacks can hijack program control flow whenever a virtual method of a corrupted object is called, potentially allowing the attacker to gain complete control of the underlying system. In this paper we present SAFEDISPATCH, a novel defense to prevent such vtable hijacking by statically analyzing C++ programs and inserting sufficient runtime checks to ensure that control flow at virtual method call sites cannot be arbitrarily influenced by an attacker. We implemented SAFEDISPATCH as a Clang++/LLVM extension, used our enhanced compiler to build a vtable-safe version of the Google Chromium browser, and measured the performance overhead of our approach on popular browser benchmark suites. By carefully crafting a handful of optimizations, we were able to reduce average runtime overhead to just 2.1%.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
Throttling Tor Bandwidth Parasites 带宽寄生虫的节流
Pub Date : 2012-08-08 DOI: 10.21236/ada559183
Rob Jansen, Nicholas Hopper, P. Syverson
Tor is vulnerable to network congestion and performance problems due to bulk data transfers. A large fraction of the available network capacity is consumed by a small percentage of Tor users, resulting in severe service degradation for the majority. Bulk users continuously drain relays of excess bandwidth, creating new network bottlenecks and exacerbating the effects of existing ones. While this problem may currently be attributed to rational users utilizing the network, it may also be exploited by a relatively low-resource adversary using similar techniques to contribute to a network denial of service (DoS) attack. Degraded service discourages the use of Tor, affecting both Tor's client diversity and anonymity. Equipped with mechanisms from communication networks, we design and implement three Tor-specific algorithms that throttle bulk transfers to reduce network congestion and increase network responsiveness. Unlike existing techniques, our algorithms adapt to network dynamics using only information local to a relay. We experiment with full-network deployments of our algorithms under a range of light to heavy network loads. We find that throttling results in significant improvements to web client performance while mitigating the negative effects of bulk transfers. We also analyze how throttling affects anonymity and compare the security of our algorithms under adversarial attack. We find that throttling reduces information leakage compared to unthrottled Tor while improving anonymity against realistic adversaries.
由于大量数据传输,Tor容易受到网络拥塞和性能问题的影响。可用网络容量的很大一部分被一小部分Tor用户消耗,导致大多数用户的服务严重退化。大量用户不断消耗中继的多余带宽,造成新的网络瓶颈,并加剧现有瓶颈的影响。虽然这个问题目前可能归因于使用网络的理性用户,但它也可能被资源相对较少的对手利用类似的技术来促进网络拒绝服务(DoS)攻击。降级的服务阻碍了Tor的使用,影响了Tor的客户端多样性和匿名性。利用通信网络机制,我们设计并实现了三种特定于tor的算法,这些算法可以抑制批量传输,以减少网络拥塞并提高网络响应能力。与现有技术不同,我们的算法仅使用中继的本地信息来适应网络动态。我们在一系列从轻到重的网络负载下对算法进行了全网部署试验。我们发现节流可以显著改善web客户端性能,同时减轻批量传输的负面影响。我们还分析了节流如何影响匿名性,并比较了我们的算法在对抗性攻击下的安全性。我们发现,与未节流的Tor相比,节流减少了信息泄漏,同时提高了对现实对手的匿名性。
{"title":"Throttling Tor Bandwidth Parasites","authors":"Rob Jansen, Nicholas Hopper, P. Syverson","doi":"10.21236/ada559183","DOIUrl":"https://doi.org/10.21236/ada559183","url":null,"abstract":"Tor is vulnerable to network congestion and performance problems due to bulk data transfers. A large fraction of the available network capacity is consumed by a small percentage of Tor users, resulting in severe service degradation for the majority. Bulk users continuously drain relays of excess bandwidth, creating new network bottlenecks and exacerbating the effects of existing ones. While this problem may currently be attributed to rational users utilizing the network, it may also be exploited by a relatively low-resource adversary using similar techniques to contribute to a network denial of service (DoS) attack. Degraded service discourages the use of Tor, affecting both Tor's client diversity and anonymity. \u0000 \u0000Equipped with mechanisms from communication networks, we design and implement three Tor-specific algorithms that throttle bulk transfers to reduce network congestion and increase network responsiveness. Unlike existing techniques, our algorithms adapt to network dynamics using only information local to a relay. We experiment with full-network deployments of our algorithms under a range of light to heavy network loads. We find that throttling results in significant improvements to web client performance while mitigating the negative effects of bulk transfers. We also analyze how throttling affects anonymity and compare the security of our algorithms under adversarial attack. We find that throttling reduces information leakage compared to unthrottled Tor while improving anonymity against realistic adversaries.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"49 1","pages":"349-363"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77659881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Taming the Devil: Techniques for Evaluating Anonymized Network Data 驯服魔鬼:评估匿名网络数据的技术
Pub Date : 2008-01-01 DOI: 10.7916/D8BC47W0
Scott E. Coull, C. V. Wright, A. Keromytis, F. Monrose, M. Reiter
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymization techniques with respect to the privacy they afford. In fact, recent work suggests that many state-of-the-art anonymization techniques may leak more information than first thought. In this paper, we propose techniques for evaluating the anonymity of network data. Specifically, we simulate the behavior of an adversary whose goal is to deanonymize objects, such as hosts or web pages, within the network data. By doing so, we are able to quantify the anonymity of the data using information theoretic metrics, objectively compare the efficacy of anonymization techniques, and examine the impact of selective deanonymization on the anonymity of the data. Moreover, we provide several concrete applications of our approach on real network data in the hope of underscoring its usefulness to data
匿名化在网络数据集的公开发布中起着关键作用,然而,很少(如果有的话)有技术来评估网络数据匿名化技术在隐私方面的有效性。事实上,最近的研究表明,许多最先进的匿名化技术可能会泄露比最初想象的更多的信息。在本文中,我们提出了评估网络数据匿名性的技术。具体来说,我们模拟对手的行为,其目标是使网络数据中的对象(如主机或网页)去匿名化。通过这样做,我们能够使用信息理论度量来量化数据的匿名性,客观地比较匿名化技术的有效性,并检查选择性去匿名化对数据匿名性的影响。此外,我们提供了我们的方法在真实网络数据上的几个具体应用,希望强调它对数据的有用性
{"title":"Taming the Devil: Techniques for Evaluating Anonymized Network Data","authors":"Scott E. Coull, C. V. Wright, A. Keromytis, F. Monrose, M. Reiter","doi":"10.7916/D8BC47W0","DOIUrl":"https://doi.org/10.7916/D8BC47W0","url":null,"abstract":"Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymization techniques with respect to the privacy they afford. In fact, recent work suggests that many state-of-the-art anonymization techniques may leak more information than first thought. In this paper, we propose techniques for evaluating the anonymity of network data. Specifically, we simulate the behavior of an adversary whose goal is to deanonymize objects, such as hosts or web pages, within the network data. By doing so, we are able to quantify the anonymity of the data using information theoretic metrics, objectively compare the efficacy of anonymization techniques, and examine the impact of selective deanonymization on the anonymity of the data. Moreover, we provide several concrete applications of our approach on real network data in the hope of underscoring its usefulness to data","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"1 1","pages":"125-135"},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A Security Framework Supporting Domain Based Access Control in Distributed Systems 支持分布式系统中基于域的访问控制的安全框架
Pub Date : 1996-02-22 DOI: 10.1109/SNDSS.1996.10001
Nicholas Yialelis, M. Sloman
This paper describes a security framework for object-based distributed systems which is being developed in the CORBA-compliant OrbixTM environment. This framework allows the development of secure distributed applications on existing operating systems that do not support distributed security. The design aims at making the authentication and access control mechanisms transparent to the application level and supporting access control policies specified using the concept of the management domain. This concept has been developed as a means of specifying policies in terms of groups of objects. The description focuses on how the Access Control List paradigm is combined with pseudo capabilities which are used as hints to improve the time-efficiency of the access control decision mechanism. The protocols to support the (cascaded) delegation of access rights to agents acting on behalf of a grantor are explained. A brief description of the authentication mechanism is also given.
本文描述了一个基于对象的分布式系统的安全框架,该框架是在corba兼容的OrbixTM环境下开发的。该框架允许在不支持分布式安全性的现有操作系统上开发安全的分布式应用程序。该设计旨在使身份验证和访问控制机制对应用程序级别透明,并支持使用管理域概念指定的访问控制策略。这个概念是作为一种根据对象组指定策略的方法而发展起来的。该描述侧重于如何将访问控制列表范例与伪功能相结合,伪功能用作提示以提高访问控制决策机制的时间效率。解释了支持将访问权限(级联)委托给代表授予者的代理的协议。对认证机制也作了简要的描述。
{"title":"A Security Framework Supporting Domain Based Access Control in Distributed Systems","authors":"Nicholas Yialelis, M. Sloman","doi":"10.1109/SNDSS.1996.10001","DOIUrl":"https://doi.org/10.1109/SNDSS.1996.10001","url":null,"abstract":"This paper describes a security framework for object-based distributed systems which is being developed in the CORBA-compliant OrbixTM environment. This framework allows the development of secure distributed applications on existing operating systems that do not support distributed security. The design aims at making the authentication and access control mechanisms transparent to the application level and supporting access control policies specified using the concept of the management domain. This concept has been developed as a means of specifying policies in terms of groups of objects. The description focuses on how the Access Control List paradigm is combined with pseudo capabilities which are used as hints to improve the time-efficiency of the access control decision mechanism. The protocols to support the (cascaded) delegation of access rights to agents acting on behalf of a grantor are explained. A brief description of the authentication mechanism is also given.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"67 1","pages":"26-39"},"PeriodicalIF":0.0,"publicationDate":"1996-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83257160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Panel: Intellectual Property Protection 小组:知识产权保护
Pub Date : 1996-01-01 DOI: 10.1109/SNDSS.1996.10000
{"title":"Panel: Intellectual Property Protection","authors":"","doi":"10.1109/SNDSS.1996.10000","DOIUrl":"https://doi.org/10.1109/SNDSS.1996.10000","url":null,"abstract":"","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"203 1","pages":"77-78"},"PeriodicalIF":0.0,"publicationDate":"1996-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76784416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Panel: Public-Key Infrastructure 专题讨论:公钥基础设施
Pub Date : 1996-01-01 DOI: 10.1109/SNDSS.1996.10006
{"title":"Panel: Public-Key Infrastructure","authors":"","doi":"10.1109/SNDSS.1996.10006","DOIUrl":"https://doi.org/10.1109/SNDSS.1996.10006","url":null,"abstract":"","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"44 1","pages":"162"},"PeriodicalIF":0.0,"publicationDate":"1996-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73476458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings 2019 Network and Distributed System Security Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1