首页 > 最新文献

Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security最新文献

英文 中文
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements 结合最小强度、最小长度和黑名单要求的更强、更可用密码的实用建议
Joshua Tan, Lujo Bauer, Nicolas Christin, L. Cranor
Multiple mechanisms exist to encourage users to create stronger passwords, including minimum-length and character-class requirements, prohibiting blocklisted passwords, and giving feedback on the strength of candidate passwords. Despite much research, there is little definitive, scientific guidance on how these mechanisms should be combined and configured to best effect. Through two online experiments, we evaluated combinations of minimum-length and character-class requirements, blocklists, and a minimum-strength requirement that requires passwords to exceed a strength threshold according to neural-network-driven password-strength estimates. Our results lead to concrete recommendations for policy configurations that produce a good balance of security and usability. In particular, for high-value user accounts we recommend policies that combine minimum-strength and minimum-length requirements. While we offer recommendations for organizations required to use blocklists, using blocklists does not provide further gains. Interestingly, we also find that against expert attackers, character-class requirements, traditionally associated with producing stronger passwords, in practice may provide very little improvement and may even reduce effective security.
存在多种机制来鼓励用户创建更强的密码,包括最小长度和字符类别要求,禁止将密码列入黑名单,并对候选密码的强度进行反馈。尽管进行了大量的研究,但关于如何将这些机制结合起来并配置以达到最佳效果,几乎没有明确的科学指导。通过两个在线实验,我们评估了最小长度和字符类要求、块列表以及根据神经网络驱动的密码强度估计要求密码超过强度阈值的最小强度要求的组合。我们的结果为策略配置提供了具体的建议,这些建议可以很好地平衡安全性和可用性。特别是,对于高价值的用户帐户,我们建议结合最小强度和最小长度要求的策略。虽然我们为需要使用阻塞列表的组织提供建议,但使用阻塞列表并不能提供进一步的收益。有趣的是,我们还发现,针对专业攻击者,字符类别要求(传统上与生成更强的密码有关)在实践中可能提供很少的改进,甚至可能降低有效的安全性。
{"title":"Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements","authors":"Joshua Tan, Lujo Bauer, Nicolas Christin, L. Cranor","doi":"10.1145/3372297.3417882","DOIUrl":"https://doi.org/10.1145/3372297.3417882","url":null,"abstract":"Multiple mechanisms exist to encourage users to create stronger passwords, including minimum-length and character-class requirements, prohibiting blocklisted passwords, and giving feedback on the strength of candidate passwords. Despite much research, there is little definitive, scientific guidance on how these mechanisms should be combined and configured to best effect. Through two online experiments, we evaluated combinations of minimum-length and character-class requirements, blocklists, and a minimum-strength requirement that requires passwords to exceed a strength threshold according to neural-network-driven password-strength estimates. Our results lead to concrete recommendations for policy configurations that produce a good balance of security and usability. In particular, for high-value user accounts we recommend policies that combine minimum-strength and minimum-length requirements. While we offer recommendations for organizations required to use blocklists, using blocklists does not provide further gains. Interestingly, we also find that against expert attackers, character-class requirements, traditionally associated with producing stronger passwords, in practice may provide very little improvement and may even reduce effective security.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83331602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Slimium: Debloating the Chromium Browser with Feature Subsetting 用功能子集来扩展Chromium浏览器
Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee
Today, a web browser plays a crucial role in offering a broad spectrum of web experiences. The most popular browser, Chromium, has become an extremely complex application to meet ever-increasing user demands, exposing unavoidably large attack vectors due to its large code base. Code debloating attracts attention as a means of reducing such a potential attack surface by eliminating unused code. However, it is very challenging to perform sophisticated code removal without breaking needed functionalities because Chromium operates on a large number of closely connected and complex components, such as a renderer and JavaScript engine. In this paper, we present Slimium, a debloating framework for a browser (i.e., Chromium) that harnesses a hybrid approach for a fast and reliable binary instrumentation. The main idea behind Slimium is to determine a set of features as a debloating unit on top of a hybrid (i.e., static, dynamic, heuristic) analysis, and then leverage feature subsetting to code debloating. It aids in i) focusing on security-oriented features, ii) discarding unneeded code simply without complications, and iii)~reasonably addressing a non-deterministic path problem raised from code complexity. To this end, we generate a feature-code map with a relation vector technique and prompt webpage profiling results. Our experimental results demonstrate the practicality and feasibility of Slimium for 40 popular websites, as on average it removes 94 CVEs (61.4%) by cutting down 23.85 MB code (53.1%) from defined features (21.7% of the whole) in Chromium.
今天,网络浏览器在提供广泛的网络体验方面起着至关重要的作用。最流行的浏览器Chromium已经成为一个极其复杂的应用程序,以满足不断增长的用户需求,由于其庞大的代码库,不可避免地暴露出巨大的攻击向量。代码膨胀作为一种通过消除未使用的代码来减少潜在攻击面的方法引起了人们的注意。然而,在不破坏所需功能的情况下执行复杂的代码删除是非常具有挑战性的,因为Chromium运行在大量紧密相连的复杂组件上,比如渲染器和JavaScript引擎。在本文中,我们介绍了Slimium,一个浏览器(即Chromium)的扩展框架,它利用混合方法实现快速可靠的二进制工具。Slimium背后的主要思想是在混合(即静态、动态、启发式)分析的基础上确定一组特性作为扩展单元,然后利用特性子集进行代码扩展。它有助于i)专注于面向安全的特性,ii)简单地丢弃不需要的代码而不引起复杂性,以及iii)合理地解决由代码复杂性引起的非确定性路径问题。为此,我们使用关系向量技术生成特征代码图,并提示网页分析结果。我们的实验结果证明了slimum在40个流行网站上的实用性和可行性,因为它平均删除了94个cve(61.4%),减少了23.85 MB的代码(53.1%),从定义的功能(占总数的21.7%)在Chromium中。
{"title":"Slimium: Debloating the Chromium Browser with Feature Subsetting","authors":"Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee","doi":"10.1145/3372297.3417866","DOIUrl":"https://doi.org/10.1145/3372297.3417866","url":null,"abstract":"Today, a web browser plays a crucial role in offering a broad spectrum of web experiences. The most popular browser, Chromium, has become an extremely complex application to meet ever-increasing user demands, exposing unavoidably large attack vectors due to its large code base. Code debloating attracts attention as a means of reducing such a potential attack surface by eliminating unused code. However, it is very challenging to perform sophisticated code removal without breaking needed functionalities because Chromium operates on a large number of closely connected and complex components, such as a renderer and JavaScript engine. In this paper, we present Slimium, a debloating framework for a browser (i.e., Chromium) that harnesses a hybrid approach for a fast and reliable binary instrumentation. The main idea behind Slimium is to determine a set of features as a debloating unit on top of a hybrid (i.e., static, dynamic, heuristic) analysis, and then leverage feature subsetting to code debloating. It aids in i) focusing on security-oriented features, ii) discarding unneeded code simply without complications, and iii)~reasonably addressing a non-deterministic path problem raised from code complexity. To this end, we generate a feature-code map with a relation vector technique and prompt webpage profiling results. Our experimental results demonstrate the practicality and feasibility of Slimium for 40 popular websites, as on average it removes 94 CVEs (61.4%) by cutting down 23.85 MB code (53.1%) from defined features (21.7% of the whole) in Chromium.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86022757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption 支持高效可验证加密的信号专用群系统和匿名凭证
Melissa Chase, Trevor Perrin, Gregory M. Zaverucha
In this paper we present a system for maintaining a membership list of users in a group, designed for use in the Signal Messenger secure messaging app. The goal is to support private groups where membership information is readily available to all group members but hidden from the service provider or anyone outside the group. In the proposed solution, a central server stores the group membership in the form of encrypted entries. Members of the group authenticate to the server in a way that reveals only that they correspond to some encrypted entry, then read and write the encrypted entries. Authentication in our design uses a primitive called a keyed-verification anonymous credential~(KVAC), and we construct a new KVAC scheme based on an algebraic MAC, instantiated in a group G of prime order. The benefit of the new KVAC is that attributes may be elements in G, whereas previous schemes could only support attributes that were integers modulo the order of G. This enables us to encrypt group data using an efficient Elgamal-like encryption scheme, and to prove in zero-knowledge that the encrypted data is certified by a credential. Because encryption, authentication, and the associated proofs of knowledge are all instantiated in G the system is efficient, even for large groups.
在本文中,我们提出了一个用于维护组中用户成员列表的系统,该系统设计用于Signal Messenger安全消息传递应用程序。目标是支持私有组,其中成员信息随时可供所有组成员使用,但对服务提供商或组外任何人隐藏。在建议的解决方案中,中央服务器以加密条目的形式存储组成员关系。组成员向服务器进行身份验证的方式只显示它们对应于某些加密条目,然后读写加密条目。在我们的设计中,身份验证使用了一种称为密钥验证匿名凭证~(KVAC)的原语,并基于代数MAC构造了一种新的KVAC方案,该方案在素数阶群G中实例化。新KVAC的好处是属性可以是G中的元素,而以前的方案只能支持以G的阶为模的整数属性。这使我们能够使用一种有效的类似elgamal的加密方案加密组数据,并在零知识中证明加密的数据是由凭证认证的。由于加密、身份验证和相关的知识证明都在G中实例化,因此系统是高效的,即使对于大型组也是如此。
{"title":"The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption","authors":"Melissa Chase, Trevor Perrin, Gregory M. Zaverucha","doi":"10.1145/3372297.3417887","DOIUrl":"https://doi.org/10.1145/3372297.3417887","url":null,"abstract":"In this paper we present a system for maintaining a membership list of users in a group, designed for use in the Signal Messenger secure messaging app. The goal is to support private groups where membership information is readily available to all group members but hidden from the service provider or anyone outside the group. In the proposed solution, a central server stores the group membership in the form of encrypted entries. Members of the group authenticate to the server in a way that reveals only that they correspond to some encrypted entry, then read and write the encrypted entries. Authentication in our design uses a primitive called a keyed-verification anonymous credential~(KVAC), and we construct a new KVAC scheme based on an algebraic MAC, instantiated in a group G of prime order. The benefit of the new KVAC is that attributes may be elements in G, whereas previous schemes could only support attributes that were integers modulo the order of G. This enables us to encrypt group data using an efficient Elgamal-like encryption scheme, and to prove in zero-knowledge that the encrypted data is certified by a credential. Because encryption, authentication, and the associated proofs of knowledge are all instantiated in G the system is efficient, even for large groups.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84670865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching Game-Set-MATCH:使用移动设备进行无缝的外部生物识别匹配
Shashank Agrawal, S. Badrinarayanan, Pratyay Mukherjee, Peter Rindal
We use biometrics like fingerprints and facial images to identify ourselves to our mobile devices and log on to applications everyday. Such authentication is internal-facing: we provide measurement on the same device where the template is stored. If our personal devices could participate in external-facing authentication too, where biometric measurement is captured by a nearby external sensor, then we could also enjoy a frictionless authentication experience in a variety of physical spaces like grocery stores, convention centers, ATMs, etc. The open setting of a physical space brings forth important privacy concerns though. We design a suite of secure protocols for external-facing authentication based on the cosine similarity metric which provide privacy for both user templates stored on their devices and the biometric measurement captured by external sensors in this open setting. The protocols provide different levels of security, ranging from passive security with some leakage to active security with no leakage at all. With the help of new packing techniques and zero-knowledge proofs for Paillier encryption -- and careful protocol design, our protocols achieve very practical performance numbers. For templates of length 256 with elements of size 16 bits each, our fastest protocol takes merely 0.024 seconds to compute a match, but even the slowest one takes no more than 0.12 seconds. The communication overhead of our protocols is very small too. The passive and actively secure protocols (with some leakage) need to exchange just 16.5KB and 27.8KB of data, respectively. The first message is designed to be reusable and, if sent in advance, would cut the overhead down to just 0.5KB and 0.8KB, respectively.
我们每天使用指纹和面部图像等生物识别技术在移动设备上识别自己,并登录应用程序。这种身份验证是面向内部的:我们在存储模板的同一设备上提供测量。如果我们的个人设备也可以参与面向外部的身份验证,生物特征测量被附近的外部传感器捕获,那么我们也可以在各种物理空间中享受无摩擦的身份验证体验,比如杂货店、会议中心、自动取款机等。然而,物理空间的开放环境带来了重要的隐私问题。我们设计了一套基于余弦相似性度量的面向外部认证的安全协议,该协议为存储在其设备上的用户模板和在此开放设置中由外部传感器捕获的生物识别测量提供隐私。这些协议提供了不同级别的安全性,从有一些泄漏的被动安全性到完全没有泄漏的主动安全性。借助新的封装技术和Paillier加密的零知识证明以及精心的协议设计,我们的协议实现了非常实用的性能数字。对于长度为256且每个元素大小为16位的模板,我们最快的协议只需要0.024秒来计算匹配,但即使是最慢的协议也不需要超过0.12秒。我们协议的通信开销也非常小。被动和主动安全协议(有一些泄漏)分别只需要交换16.5KB和27.8KB的数据。第一条消息被设计为可重用的,如果提前发送,将把开销分别减少到0.5KB和0.8KB。
{"title":"Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching","authors":"Shashank Agrawal, S. Badrinarayanan, Pratyay Mukherjee, Peter Rindal","doi":"10.1145/3372297.3417287","DOIUrl":"https://doi.org/10.1145/3372297.3417287","url":null,"abstract":"We use biometrics like fingerprints and facial images to identify ourselves to our mobile devices and log on to applications everyday. Such authentication is internal-facing: we provide measurement on the same device where the template is stored. If our personal devices could participate in external-facing authentication too, where biometric measurement is captured by a nearby external sensor, then we could also enjoy a frictionless authentication experience in a variety of physical spaces like grocery stores, convention centers, ATMs, etc. The open setting of a physical space brings forth important privacy concerns though. We design a suite of secure protocols for external-facing authentication based on the cosine similarity metric which provide privacy for both user templates stored on their devices and the biometric measurement captured by external sensors in this open setting. The protocols provide different levels of security, ranging from passive security with some leakage to active security with no leakage at all. With the help of new packing techniques and zero-knowledge proofs for Paillier encryption -- and careful protocol design, our protocols achieve very practical performance numbers. For templates of length 256 with elements of size 16 bits each, our fastest protocol takes merely 0.024 seconds to compute a match, but even the slowest one takes no more than 0.12 seconds. The communication overhead of our protocols is very small too. The passive and actively secure protocols (with some leakage) need to exchange just 16.5KB and 27.8KB of data, respectively. The first message is designed to be reusable and, if sent in advance, would cut the overhead down to just 0.5KB and 0.8KB, respectively.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"121 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88259674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions 可编程一次公共函数的最小对称PAKE和1- of- n not
Ian McQuoid, Mike Rosulek, Lawrence Roy
Symmetric password-authenticated key exchange (sPAKE) can be seen as an extension of traditional key exchange where two parties agree on a shared key if and only if they share a common secret (possibly low-entropy) password. We present the first sPAKE protocol to simultaneously achieve the following properties: only two exponentiations per party, the same as plain unauthenticated Diffie-Hellman key agreement (and likely optimal); optimal round complexity: a single flow (one message from each party that can be sent in parallel) to achieve implicit authentication, or two flows to achieve explicit mutual authentication; security in the random oracle model, rather than ideal cipher or generic group model; UC security, rather than game-based. Our protocol is a generalization of the seminal EKE protocol of Bellovin & Merritt (S&P 1992). We also present a UC-secure 1-out-of-N oblivious transfer (OT) protocol, for random payloads. Its communication complexity is independent of N, meaning that N can even be exponential in the security parameter. Such a protocol can also be considered a kind of oblivious PRF (OPRF). Our protocol improves over the leading UC-secure 1-out-of-N OT construction of Masny & Rindal (CCS 2019) for all N>2, and has essentially the same cost for N=2. The new technique underlying these results is a primitive we call programmable-once public function (POPF). Intuitively, a POPF is a function whose output can be programmed by one party on exactly one point. All other outputs of the function are outside of any party's control, in a provable sense.
对称密码认证密钥交换(spoke)可以看作是传统密钥交换的扩展,当且仅当双方共享一个公共秘密(可能是低熵)密码时,双方就共享密钥达成一致。我们提出了第一个同时实现以下属性的spek协议:每一方只有两次幂,与普通的未经身份验证的Diffie-Hellman密钥协议相同(并且可能是最优的);最优轮复杂度:单个流(每一方可以并行发送一条消息)实现隐式身份验证,或者两个流实现显式相互身份验证;安全性在随机oracle模型,而不是理想的密码或一般组模型;UC安全,而不是基于游戏。我们的协议是对Bellovin & Merritt(标准普尔1992)开创性EKE协议的概括。我们还提出了一个uc安全的1- of- n无关传输(OT)协议,用于随机有效负载。它的通信复杂度与N无关,这意味着N甚至可以是安全参数的指数。这种协议也可以看作是一种无关PRF (OPRF)。对于所有N>2的情况,我们的协议改进了Masny & Rindal (CCS 2019)领先的uc -安全1- of-N OT结构,并且N=2的成本基本相同。这些结果背后的新技术是一个我们称之为可编程一次的公共函数(POPF)的原语。直观地说,POPF是一个函数,它的输出可以由一方在一个点上编程。在可证明的意义上,该函数的所有其他输出都不受任何一方的控制。
{"title":"Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions","authors":"Ian McQuoid, Mike Rosulek, Lawrence Roy","doi":"10.1145/3372297.3417870","DOIUrl":"https://doi.org/10.1145/3372297.3417870","url":null,"abstract":"Symmetric password-authenticated key exchange (sPAKE) can be seen as an extension of traditional key exchange where two parties agree on a shared key if and only if they share a common secret (possibly low-entropy) password. We present the first sPAKE protocol to simultaneously achieve the following properties: only two exponentiations per party, the same as plain unauthenticated Diffie-Hellman key agreement (and likely optimal); optimal round complexity: a single flow (one message from each party that can be sent in parallel) to achieve implicit authentication, or two flows to achieve explicit mutual authentication; security in the random oracle model, rather than ideal cipher or generic group model; UC security, rather than game-based. Our protocol is a generalization of the seminal EKE protocol of Bellovin & Merritt (S&P 1992). We also present a UC-secure 1-out-of-N oblivious transfer (OT) protocol, for random payloads. Its communication complexity is independent of N, meaning that N can even be exponential in the security parameter. Such a protocol can also be considered a kind of oblivious PRF (OPRF). Our protocol improves over the leading UC-secure 1-out-of-N OT construction of Masny & Rindal (CCS 2019) for all N>2, and has essentially the same cost for N=2. The new technique underlying these results is a primitive we call programmable-once public function (POPF). Intuitively, a POPF is a function whose output can be programmed by one party on exactly one point. All other outputs of the function are outside of any party's control, in a provable sense.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88108499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
BlackMirror: Preventing Wallhacks in 3D Online FPS Games BlackMirror:防止3D在线FPS游戏中的墙盗
Seonghyun Park, Adil Ahmad, Byoungyoung Lee
Online gaming, with a reported 152 billion US dollar market, is immensely popular today. One of the critical issues in multiplayer online games is cheating, in which a player uses an illegal methodology to create an advantage beyond honest game play. For example, wallhacks, the main focus of this work, animate enemy objects on a cheating player's screen, despite being actually hidden behind walls (or other occluding objects). Since such cheats discourage honest players and cause game companies to lose revenue, gaming companies deploy mitigation solutions alongside game applications on the player's machine. However, their solutions are fundamentally flawed since they are deployed on a machine where the attacker has absolute control.
据报道,在线游戏市场规模达1520亿美元,如今非常受欢迎。多人在线游戏中的一个关键问题是作弊,即玩家使用非法方法来创造超越诚实游戏的优势。例如,wallhacks(游戏邦注:这一工作的主要焦点)会在作弊玩家的屏幕上呈现敌方物体的动画,尽管它们实际上隐藏在墙壁(或其他遮挡物体)后面。由于这种作弊行为会打击诚实玩家的积极性,并导致游戏公司损失收益,所以游戏公司会在玩家的电脑上部署缓解方案和游戏应用程序。然而,他们的解决方案从根本上是有缺陷的,因为它们部署在攻击者拥有绝对控制权的机器上。
{"title":"BlackMirror: Preventing Wallhacks in 3D Online FPS Games","authors":"Seonghyun Park, Adil Ahmad, Byoungyoung Lee","doi":"10.1145/3372297.3417890","DOIUrl":"https://doi.org/10.1145/3372297.3417890","url":null,"abstract":"Online gaming, with a reported 152 billion US dollar market, is immensely popular today. One of the critical issues in multiplayer online games is cheating, in which a player uses an illegal methodology to create an advantage beyond honest game play. For example, wallhacks, the main focus of this work, animate enemy objects on a cheating player's screen, despite being actually hidden behind walls (or other occluding objects). Since such cheats discourage honest players and cause game companies to lose revenue, gaming companies deploy mitigation solutions alongside game applications on the player's machine. However, their solutions are fundamentally flawed since they are deployed on a machine where the attacker has absolute control.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88165562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral 僵尸觉醒:通过DNS主机推荐隐秘劫持活跃域
Eihal Alowaisheq, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, Xiaofeng Wang
In recent years, the security implication of stale NS records, which point to a nameserver that no longer resolves the domain, has been unveiled. Prior research studied the stale DNS records that point to expired domains. The popularity of DNS hosting services brings in a new category of stale NS records, which reside in the domain's zone (instead of the TLD zone) for an active domain. To the best of our knowledge, the security risk of this kind of stale NS record has never been studied before. In our research, we show that this new type of stale NS record can be practically exploited, causing a stealthier hijack of domains associated with the DNS hosting service. We also performed a large-scale analysis on over 1M high-profile domains, 17 DNS hosting providers and 12 popular public resolver operators to confirm the prevalence of this security risk. Our research further discovers 628 hijackable domains (e.g., 6 government entities and 2 payment services), 14 affected DNS hosting providers (e.g., Amazon Route 53), and 10 vulnerable public resolver operators (e.g., CloudFlare). Furthermore, we conducted an in-depth measurement analysis on them, thus providing a better understanding of this new security risk. Also, we explore the mitigation techniques that can be adopted by different affected parties.
近年来,陈旧的NS记录(指向一个不再解析域名的域名服务器)的安全隐患已经暴露出来。之前的研究研究了指向过期域名的过期DNS记录。DNS托管服务的普及带来了一种新的过时的NS记录类别,它们驻留在活跃域的域区域(而不是TLD区域)中。据我们所知,这种陈旧的NS记录的安全风险以前从未被研究过。在我们的研究中,我们表明这种新型的陈旧的NS记录可以被实际利用,导致与DNS托管服务相关的域被偷偷劫持。我们还对超过100万个高知名度域名、17个DNS托管提供商和12个流行的公共解析器运营商进行了大规模分析,以确认这种安全风险的普遍性。我们的研究进一步发现了628个可劫持域名(例如,6个政府实体和2个支付服务),14个受影响的DNS托管提供商(例如,Amazon Route 53)和10个易受攻击的公共解析器运营商(例如,CloudFlare)。此外,我们对它们进行了深入的度量分析,从而更好地理解了这种新的安全风险。此外,我们还探讨了不同受影响方可以采用的缓解技术。
{"title":"Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral","authors":"Eihal Alowaisheq, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, Xiaofeng Wang","doi":"10.1145/3372297.3417864","DOIUrl":"https://doi.org/10.1145/3372297.3417864","url":null,"abstract":"In recent years, the security implication of stale NS records, which point to a nameserver that no longer resolves the domain, has been unveiled. Prior research studied the stale DNS records that point to expired domains. The popularity of DNS hosting services brings in a new category of stale NS records, which reside in the domain's zone (instead of the TLD zone) for an active domain. To the best of our knowledge, the security risk of this kind of stale NS record has never been studied before. In our research, we show that this new type of stale NS record can be practically exploited, causing a stealthier hijack of domains associated with the DNS hosting service. We also performed a large-scale analysis on over 1M high-profile domains, 17 DNS hosting providers and 12 popular public resolver operators to confirm the prevalence of this security risk. Our research further discovers 628 hijackable domains (e.g., 6 government entities and 2 payment services), 14 affected DNS hosting providers (e.g., Amazon Route 53), and 10 vulnerable public resolver operators (e.g., CloudFlare). Furthermore, we conducted an in-depth measurement analysis on them, thus providing a better understanding of this new security risk. Also, we explore the mitigation techniques that can be adopted by different affected parties.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91090457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Machine Learning and Security: The Good, The Bad, and The Ugly 机器学习与安全:好、坏、丑
Wenke Lee
I would like to share my thoughts on the interactions between machine learning and security. The good: We now have more data, more powerful machines and algorithms, and better yet, we don't need to always manually engineered the features. The ML process is now much more automated and the learned models are more powerful, and this is a positive feedback loop: more data leads to better models, which lead to more deployments, which lead to more data. All security vendors now advertise that they use ML in their products. The bad: There are more unknowns. In the past, we knew the capabilities and limitations of our security models, including the ML-based models, and understood how they can be evaded. But the state-of-the-art models such as deep neural networks are not as intelligible as classical models such as decision trees. How do we decide to deploy a deep learning-based model for security when we don't know for sure it is learned correctly? Data poisoning becomes easier. On-line learning and web-based learning use data collected in run-time and often from an open environment. Since such data is often resulted from human actions, it can be intentionally polluted, e.g., in misinformation campaigns. How do we make it harder for attackers to manipulate the training data? The ugly: Attackers will keep on exploiting the holes in ML, and automate their attacks using ML. Why don't we just secure ML? This would be no different than trying to secure our programs, and systems, and networks, so we can't. We have to prepare for ML failures. Ultimately, humans have to be involved. The question is how and when? For example, what information should a ML-based system present to humans and what input can humans provide to the system?
我想分享一下我对机器学习和安全之间相互作用的看法。好处:我们现在有更多的数据,更强大的机器和算法,更好的是,我们不需要总是手动设计功能。机器学习过程现在更加自动化,学习模型更加强大,这是一个积极的反馈循环:更多的数据导致更好的模型,从而导致更多的部署,从而导致更多的数据。所有的安全供应商现在都宣称他们在他们的产品中使用ML。坏的方面:有更多的未知。在过去,我们知道安全模型(包括基于ml的模型)的功能和限制,并了解如何规避它们。但最先进的模型,如深度神经网络,不如经典模型,如决策树那样容易理解。当我们不确定它是否正确学习时,我们如何决定部署基于深度学习的安全模型?数据中毒变得更容易。在线学习和基于web的学习使用在运行时收集的数据,通常来自开放环境。由于这些数据通常是由人类活动产生的,因此可能会被故意污染,例如在虚假宣传活动中。我们如何使攻击者难以操纵训练数据?丑陋之处:攻击者将继续利用机器学习中的漏洞,并使用机器学习自动化攻击。我们为什么不保护机器学习呢?这与试图保护我们的程序、系统和网络没有什么不同,所以我们不能。我们必须为机器学习失败做好准备。最终,人类必须参与其中。问题是如何和何时?例如,基于ml的系统应该向人类提供什么信息,人类可以向系统提供什么输入?
{"title":"Machine Learning and Security: The Good, The Bad, and The Ugly","authors":"Wenke Lee","doi":"10.1145/3372297.3424552","DOIUrl":"https://doi.org/10.1145/3372297.3424552","url":null,"abstract":"I would like to share my thoughts on the interactions between machine learning and security. The good: We now have more data, more powerful machines and algorithms, and better yet, we don't need to always manually engineered the features. The ML process is now much more automated and the learned models are more powerful, and this is a positive feedback loop: more data leads to better models, which lead to more deployments, which lead to more data. All security vendors now advertise that they use ML in their products. The bad: There are more unknowns. In the past, we knew the capabilities and limitations of our security models, including the ML-based models, and understood how they can be evaded. But the state-of-the-art models such as deep neural networks are not as intelligible as classical models such as decision trees. How do we decide to deploy a deep learning-based model for security when we don't know for sure it is learned correctly? Data poisoning becomes easier. On-line learning and web-based learning use data collected in run-time and often from an open environment. Since such data is often resulted from human actions, it can be intentionally polluted, e.g., in misinformation campaigns. How do we make it harder for attackers to manipulate the training data? The ugly: Attackers will keep on exploiting the holes in ML, and automate their attacks using ML. Why don't we just secure ML? This would be no different than trying to secure our programs, and systems, and networks, so we can't. We have to prepare for ML failures. Ultimately, humans have to be involved. The question is how and when? For example, what information should a ML-based system present to humans and what input can humans provide to the system?","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74206674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 2E: Smart Contracts and Cryptocurrencies 会话详细信息:会话2E:智能合约和加密货币
Foteini Baldimtsi
{"title":"Session details: Session 2E: Smart Contracts and Cryptocurrencies","authors":"Foteini Baldimtsi","doi":"10.1145/3432966","DOIUrl":"https://doi.org/10.1145/3432966","url":null,"abstract":"","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73984157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC 在墙上戳个洞:寄生在WebRTC上的有效的抗审查互联网通信
Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
Many censorship circumvention tools rely on trusted proxies that allow users within censored regions to access blocked Internet content by tunneling it through a covert channel (e.g,. piggybacking on Skype video calls). However, building tools that can simultaneously (i) provide good bandwidth capacity for accommodating the typical activities of Internet users, and (ii) be secure against traffic analysis attacks has remained an open problem and a stumbling block to the practical adoption of such tools for censorship evasion. We present Protozoa, a censorship-resistant tunneling tool featuring both high-performing covert channels and strong traffic analysis resistance. To create a covert channel, a user only needs to make a video call with a trusted party located outside the censored region using a popular WebRTC streaming service, e.g., Whereby. Protozoa can then covertly tunnel all IP traffic from unmodified user applications (e.g., Firefox) through the WebRTC video stream. This is achieved by hooking into the WebRTC stack and replacing the encoded video frame data with IP packet payload, while ensuring that the payload of the WebRTC stream remains encrypted, and the stream's statistical properties remain in all identical to those of any common video call. This technique allows for sustaining enough throughput to enable common-use Internet applications, e.g., web browsing or bulk data transfer, and avoid detection by state-of-the-art traffic analysis attacks. We show that Protozoa is able to evade state-level censorship in China, Russia, and India.
许多审查规避工具依赖于可信代理,允许审查区域内的用户通过隐蔽通道(例如,通过隧道)访问被封锁的互联网内容。借助Skype视频通话)。然而,构建能够同时(i)提供良好的带宽容量以适应互联网用户的典型活动,以及(ii)防止流量分析攻击的工具仍然是一个开放的问题,并且是实际采用此类工具以逃避审查的绊脚石。我们提出了Protozoa,一个抗审查的隧道工具,具有高性能的隐蔽通道和强大的流量分析阻力。要创建隐蔽通道,用户只需要使用流行的WebRTC流媒体服务与位于审查区域之外的受信任方进行视频通话,例如:然后Protozoa可以通过WebRTC视频流从未修改的用户应用程序(例如Firefox)秘密地隧道所有IP流量。这是通过连接到WebRTC堆栈并用IP数据包有效载荷替换编码的视频帧数据来实现的,同时确保WebRTC流的有效载荷保持加密,并且流的统计属性与任何普通视频呼叫的统计属性完全相同。该技术允许维持足够的吞吐量,以支持常用的互联网应用程序,例如网页浏览或批量数据传输,并避免被最先进的流量分析攻击检测到。我们表明Protozoa能够逃避中国、俄罗斯和印度的国家级审查。
{"title":"Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC","authors":"Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes","doi":"10.1145/3372297.3417874","DOIUrl":"https://doi.org/10.1145/3372297.3417874","url":null,"abstract":"Many censorship circumvention tools rely on trusted proxies that allow users within censored regions to access blocked Internet content by tunneling it through a covert channel (e.g,. piggybacking on Skype video calls). However, building tools that can simultaneously (i) provide good bandwidth capacity for accommodating the typical activities of Internet users, and (ii) be secure against traffic analysis attacks has remained an open problem and a stumbling block to the practical adoption of such tools for censorship evasion. We present Protozoa, a censorship-resistant tunneling tool featuring both high-performing covert channels and strong traffic analysis resistance. To create a covert channel, a user only needs to make a video call with a trusted party located outside the censored region using a popular WebRTC streaming service, e.g., Whereby. Protozoa can then covertly tunnel all IP traffic from unmodified user applications (e.g., Firefox) through the WebRTC video stream. This is achieved by hooking into the WebRTC stack and replacing the encoded video frame data with IP packet payload, while ensuring that the payload of the WebRTC stream remains encrypted, and the stream's statistical properties remain in all identical to those of any common video call. This technique allows for sustaining enough throughput to enable common-use Internet applications, e.g., web browsing or bulk data transfer, and avoid detection by state-of-the-art traffic analysis attacks. We show that Protozoa is able to evade state-level censorship in China, Russia, and India.","PeriodicalId":20481,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","volume":"07 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78371271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1