首页 > 最新文献

Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security最新文献

英文 中文
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated 数据驻留证明:检查您的云文件是否已重新定位
Hung Dang, Erick Purwanto, E. Chang
While cloud storage services offer manifold benefits such as cost-effectiveness or elasticity, there also exist various security and privacy concerns. Among such concerns, we pay our primary attention to data residency -- a notion that requires outsourced data to be retrievable in its entirety from local drives of a storage server in-question. We formulate such notion under a security model called Proofs of Data Residency (PoDR). can be employed to check whether the data are replicated across different storage servers, or combined with storage server geolocation to "locate" the data in the cloud. We make key observations that the data residency checking protocol should exclude all server-side computation and that each challenge should ask for no more than a single atomic fetching operation. We illustrate challenges and subtleties in protocol design by showing potential attacks to naive constructions. Next, we present a secure PoDR scheme structured as a timed challenge-response protocol. Two implementation variants of the proposed solution, namely NVeri and EVeri, describe an interesting use-case of trusted computing, in particular the use of Intel SGX, in cryptographic timed challenge-response protocols whereby having the verifier co-locating with the prover offers security enhancement. Finally, we conduct extensive experiments to exhibit potential attacks to insecure constructions and validate the performance as well as the security of our solution.
虽然云存储服务提供了多种好处,如成本效益或弹性,但也存在各种安全性和隐私问题。在这些问题中,我们主要关注的是数据驻留——这一概念要求外包数据可以从存储服务器的本地驱动器中完整地检索到。我们在称为数据驻留证明(PoDR)的安全模型下表述了这样的概念。可以用来检查数据是否在不同的存储服务器上复制,或者结合存储服务器地理位置来“定位”云中的数据。我们观察到数据驻留检查协议应该排除所有服务器端计算,并且每个挑战应该只要求一个原子抓取操作。我们通过展示对幼稚构造的潜在攻击来说明协议设计中的挑战和微妙之处。接下来,我们提出了一个安全的PoDR方案结构为定时挑战响应协议。提出的解决方案的两个实现变体,即NVeri和EVeri,描述了可信计算的一个有趣用例,特别是在加密定时挑战响应协议中使用英特尔SGX,通过将验证者与证明者共同定位提供安全性增强。最后,我们进行了大量的实验,以展示对不安全结构的潜在攻击,并验证我们的解决方案的性能和安全性。
{"title":"Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated","authors":"Hung Dang, Erick Purwanto, E. Chang","doi":"10.1145/3052973.3053016","DOIUrl":"https://doi.org/10.1145/3052973.3053016","url":null,"abstract":"While cloud storage services offer manifold benefits such as cost-effectiveness or elasticity, there also exist various security and privacy concerns. Among such concerns, we pay our primary attention to data residency -- a notion that requires outsourced data to be retrievable in its entirety from local drives of a storage server in-question. We formulate such notion under a security model called Proofs of Data Residency (PoDR). can be employed to check whether the data are replicated across different storage servers, or combined with storage server geolocation to \"locate\" the data in the cloud. We make key observations that the data residency checking protocol should exclude all server-side computation and that each challenge should ask for no more than a single atomic fetching operation. We illustrate challenges and subtleties in protocol design by showing potential attacks to naive constructions. Next, we present a secure PoDR scheme structured as a timed challenge-response protocol. Two implementation variants of the proposed solution, namely NVeri and EVeri, describe an interesting use-case of trusted computing, in particular the use of Intel SGX, in cryptographic timed challenge-response protocols whereby having the verifier co-locating with the prover offers security enhancement. Finally, we conduct extensive experiments to exhibit potential attacks to insecure constructions and validate the performance as well as the security of our solution.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88294239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Extracting Conditional Formulas for Cross-Platform Bug Search 跨平台Bug搜索提取条件公式
Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin
With the recent increase in security breaches in embedded systems and IoT devices, it becomes increasingly important to search for vulnerabilities directly in binary executables in a cross-platform setting. However, very little has been explored in this domain. The existing efforts are prone to producing considerable false positives, and their results cannot provide explainable evidence for human analysts to eliminate these false positives. In this paper, we propose to extract conditional formulas as higher-level semantic features from the raw binary code to conduct the code search. A conditional formula explicitly captures two cardinal factors of a bug: 1) erroneous data dependencies and 2) missing or invalid condition checks. As a result, binary code search on conditional formulas produces significantly higher accuracy and provide meaningful evidence for human analysts to further examine the search results. We have implemented a prototype, XMATCH, and evaluated it using well-known software, including OpenSSL and BusyBox. Experimental results have shown that XMATCH outperforms the existing bug search techniques in terms of accuracy. Moreover, by evaluating 5 recent vulnerabilities, XMATCH provides clear evidence for human analysts to determine if a matched candidate is indeed vulnerable or has been patched.
随着最近嵌入式系统和物联网设备中安全漏洞的增加,在跨平台设置中直接在二进制可执行文件中搜索漏洞变得越来越重要。然而,这一领域的研究很少。现有的努力容易产生相当大的假阳性,其结果不能为人类分析人员提供可解释的证据来消除这些假阳性。在本文中,我们提出从原始二进制代码中提取条件公式作为高级语义特征来进行代码搜索。条件公式明确地捕获了bug的两个主要因素:1)错误的数据依赖关系和2)缺少或无效的条件检查。因此,基于条件公式的二进制代码搜索产生了更高的准确性,并为人类分析人员进一步检查搜索结果提供了有意义的证据。我们已经实现了一个原型XMATCH,并使用知名软件(包括OpenSSL和BusyBox)对其进行了评估。实验结果表明,XMATCH在准确性方面优于现有的错误搜索技术。此外,通过评估5个最近的漏洞,XMATCH为人类分析人员提供了明确的证据,以确定匹配的候选对象是否确实存在漏洞或已被修补。
{"title":"Extracting Conditional Formulas for Cross-Platform Bug Search","authors":"Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin","doi":"10.1145/3052973.3052995","DOIUrl":"https://doi.org/10.1145/3052973.3052995","url":null,"abstract":"With the recent increase in security breaches in embedded systems and IoT devices, it becomes increasingly important to search for vulnerabilities directly in binary executables in a cross-platform setting. However, very little has been explored in this domain. The existing efforts are prone to producing considerable false positives, and their results cannot provide explainable evidence for human analysts to eliminate these false positives. In this paper, we propose to extract conditional formulas as higher-level semantic features from the raw binary code to conduct the code search. A conditional formula explicitly captures two cardinal factors of a bug: 1) erroneous data dependencies and 2) missing or invalid condition checks. As a result, binary code search on conditional formulas produces significantly higher accuracy and provide meaningful evidence for human analysts to further examine the search results. We have implemented a prototype, XMATCH, and evaluated it using well-known software, including OpenSSL and BusyBox. Experimental results have shown that XMATCH outperforms the existing bug search techniques in terms of accuracy. Moreover, by evaluating 5 recent vulnerabilities, XMATCH provides clear evidence for human analysts to determine if a matched candidate is indeed vulnerable or has been patched.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74129207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Pinpointing Vulnerabilities 确定漏洞
Yueh-Ting Chen, M. Khandaker, Zhi Wang
Memory-based vulnerabilities are a major source of attack vectors. They allow attackers to gain unauthorized access to computers and their data. Previous research has made significant progress in detecting attacks. However, developers still need to locate and fix these vulnerabilities, a mostly manual and time-consuming process. They face a number of challenges. Particularly, the manifestation of an attack does not always coincide with the exploited vulnerabilities, and many attacks are hard to reproduce in the lab environment, leaving developers with limited information to locate them. In this paper, we propose Ravel, an architectural approach to pinpoint vulnerabilities from attacks. Ravel consists of an online attack detector and an offline vulnerability locator linked by a record & replay mechanism. Specifically, Ravel records the execution of a production system and simultaneously monitors it for attacks. If an attack is detected, the execution is replayed to reveal the targeted vulnerabilities by analyzing the program's memory access patterns under attack. We have built a prototype of Ravel based on the open-source FreeBSD operating system. The evaluation results in security and performance demonstrate that Ravel can effectively pinpoint various types of memory vulnerabilities and has low performance overhead.
基于内存的漏洞是攻击向量的主要来源。它们允许攻击者未经授权访问计算机及其数据。先前的研究在检测攻击方面取得了重大进展。然而,开发人员仍然需要定位和修复这些漏洞,这是一个手动且耗时的过程。他们面临着许多挑战。特别是,攻击的表现并不总是与被利用的漏洞一致,并且许多攻击很难在实验室环境中重现,这使得开发人员只能获得有限的信息来定位它们。在本文中,我们提出了Ravel,一种从攻击中精确定位漏洞的架构方法。Ravel由在线攻击检测器和离线漏洞定位器组成,由记录和重播机制链接。具体来说,Ravel记录生产系统的执行情况,并同时监视攻击。如果检测到攻击,则通过分析受攻击程序的内存访问模式来重播执行以揭示目标漏洞。我们已经基于开源的FreeBSD操作系统构建了一个Ravel的原型。安全性和性能的评估结果表明,Ravel可以有效地定位各种类型的内存漏洞,并且具有较低的性能开销。
{"title":"Pinpointing Vulnerabilities","authors":"Yueh-Ting Chen, M. Khandaker, Zhi Wang","doi":"10.1145/3052973.3053033","DOIUrl":"https://doi.org/10.1145/3052973.3053033","url":null,"abstract":"Memory-based vulnerabilities are a major source of attack vectors. They allow attackers to gain unauthorized access to computers and their data. Previous research has made significant progress in detecting attacks. However, developers still need to locate and fix these vulnerabilities, a mostly manual and time-consuming process. They face a number of challenges. Particularly, the manifestation of an attack does not always coincide with the exploited vulnerabilities, and many attacks are hard to reproduce in the lab environment, leaving developers with limited information to locate them. In this paper, we propose Ravel, an architectural approach to pinpoint vulnerabilities from attacks. Ravel consists of an online attack detector and an offline vulnerability locator linked by a record & replay mechanism. Specifically, Ravel records the execution of a production system and simultaneously monitors it for attacks. If an attack is detected, the execution is replayed to reveal the targeted vulnerabilities by analyzing the program's memory access patterns under attack. We have built a prototype of Ravel based on the open-source FreeBSD operating system. The evaluation results in security and performance demonstrate that Ravel can effectively pinpoint various types of memory vulnerabilities and has low performance overhead.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74293643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets 侦测手机应用市场中的串通排名操纵攻击者
Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang
Incentivized by monetary gain, some app developers launch fraudulent campaigns to boost their apps' rankings in the mobile app stores. They pay some service providers for boost services, which then organize large groups of collusive attackers to take fraudulent actions such as posting high app ratings or inflating apps' downloads. If not addressed timely, such attacks will increasingly damage the healthiness of app ecosystems. In this work, we propose a novel approach to identify attackers of collusive promotion groups in an app store. Our approach exploits the unusual ranking change patterns of apps to identify promoted apps, measures their pairwise similarity, forms targeted app clusters (TACs), and finally identifies the collusive group members. Our evaluation based on a dataset of Apple's China App store has demonstrated that our approach is able and scalable to report highly suspicious apps and reviewers. App stores may use our techniques to narrow down the suspicious lists for further investigation.
在金钱利益的激励下,一些应用开发者为了提高应用在手机应用商店中的排名而发起欺诈活动。他们向一些服务提供商付费以获得提升服务,这些服务提供商随后组织大量串通攻击者采取欺诈行为,例如发布高应用评级或夸大应用下载量。如果不及时解决,这种攻击将越来越多地损害应用生态系统的健康。在这项工作中,我们提出了一种新的方法来识别应用商店中串通促销小组的攻击者。我们的方法利用应用程序不寻常的排名变化模式来识别推广应用程序,测量它们的成对相似性,形成目标应用集群(tac),并最终识别共谋组成员。我们基于苹果中国应用商店数据集的评估表明,我们的方法能够且可扩展地报告高度可疑的应用和评论者。应用商店可能会使用我们的技术来缩小可疑列表,以便进一步调查。
{"title":"Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets","authors":"Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang","doi":"10.1145/3052973.3053022","DOIUrl":"https://doi.org/10.1145/3052973.3053022","url":null,"abstract":"Incentivized by monetary gain, some app developers launch fraudulent campaigns to boost their apps' rankings in the mobile app stores. They pay some service providers for boost services, which then organize large groups of collusive attackers to take fraudulent actions such as posting high app ratings or inflating apps' downloads. If not addressed timely, such attacks will increasingly damage the healthiness of app ecosystems. In this work, we propose a novel approach to identify attackers of collusive promotion groups in an app store. Our approach exploits the unusual ranking change patterns of apps to identify promoted apps, measures their pairwise similarity, forms targeted app clusters (TACs), and finally identifies the collusive group members. Our evaluation based on a dataset of Apple's China App store has demonstrated that our approach is able and scalable to report highly suspicious apps and reviewers. App stores may use our techniques to narrow down the suspicious lists for further investigation.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74731132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic 盲点:市场兼容和隐私友好的加密流量入侵检测系统
Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, M. Sabt
The goal of network intrusion detection is to inspect network traffic in order to identify threats and known attack patterns. One of its key features is Deep Packet Inspection (DPI), that extracts the content of network packets and compares it against a set of detection signatures. While DPI is commonly used to protect networks and information systems, it requires direct access to the traffic content, which makes it blinded against encrypted network protocols such as HTTPS. So far, a difficult choice was to be made between the privacy of network users and security through the inspection of their traffic content to detect attacks or malicious activities. This paper presents a novel approach that bridges the gap between network security and privacy. It makes possible to perform DPI directly on encrypted traffic, without knowing neither the traffic content, nor the patterns of detection signatures. The relevance of our work is that it preserves the delicate balance in the security market ecosystem. Indeed, security editors will be able to protect their distinctive detection signatures and supply service providers only with encrypted attack patterns. In addition, service providers will be able to integrate the encrypted signatures in their architectures and perform DPI without compromising the privacy of network communications. Finally, users will be able to preserve their privacy through traffic encryption, while also benefiting from network security services. The extensive experiments conducted in this paper prove that, compared to existing encryption schemes, our solution reduces by 3 orders of magnitude the connection setup time for new users, and by 6 orders of magnitude the consumed memory space on the DPI appliance.
网络入侵检测的目标是检查网络流量,以识别威胁和已知的攻击模式。它的关键特性之一是深度包检测(DPI),它提取网络数据包的内容,并将其与一组检测签名进行比较。虽然DPI通常用于保护网络和信息系统,但它需要直接访问流量内容,这使得它对HTTPS等加密网络协议视而不见。迄今为止,通过对网络用户的流量内容进行检查来检测攻击或恶意活动,在用户隐私和安全之间做出了艰难的选择。本文提出了一种弥合网络安全和隐私之间鸿沟的新方法。它可以在不知道流量内容和检测签名模式的情况下直接对加密流量执行DPI。我们工作的意义在于,它保持了证券市场生态系统的微妙平衡。事实上,安全编辑器将能够保护其独特的检测签名,并仅向服务提供者提供加密的攻击模式。此外,服务提供商将能够在其体系结构中集成加密签名,并在不损害网络通信隐私的情况下执行DPI。最后,用户将能够通过流量加密保护他们的隐私,同时也受益于网络安全服务。本文进行的大量实验证明,与现有的加密方案相比,我们的解决方案将新用户的连接建立时间减少了3个数量级,并将DPI设备上消耗的内存空间减少了6个数量级。
{"title":"BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic","authors":"Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, M. Sabt","doi":"10.1145/3052973.3053013","DOIUrl":"https://doi.org/10.1145/3052973.3053013","url":null,"abstract":"The goal of network intrusion detection is to inspect network traffic in order to identify threats and known attack patterns. One of its key features is Deep Packet Inspection (DPI), that extracts the content of network packets and compares it against a set of detection signatures. While DPI is commonly used to protect networks and information systems, it requires direct access to the traffic content, which makes it blinded against encrypted network protocols such as HTTPS. So far, a difficult choice was to be made between the privacy of network users and security through the inspection of their traffic content to detect attacks or malicious activities. This paper presents a novel approach that bridges the gap between network security and privacy. It makes possible to perform DPI directly on encrypted traffic, without knowing neither the traffic content, nor the patterns of detection signatures. The relevance of our work is that it preserves the delicate balance in the security market ecosystem. Indeed, security editors will be able to protect their distinctive detection signatures and supply service providers only with encrypted attack patterns. In addition, service providers will be able to integrate the encrypted signatures in their architectures and perform DPI without compromising the privacy of network communications. Finally, users will be able to preserve their privacy through traffic encryption, while also benefiting from network security services. The extensive experiments conducted in this paper prove that, compared to existing encryption schemes, our solution reduces by 3 orders of magnitude the connection setup time for new users, and by 6 orders of magnitude the consumed memory space on the DPI appliance.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74875082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Advanced Security Research in the Era of the Internet of Things 物联网时代的高级安全研究
G. Akers
As the evolution of technology accelerates toward the "Everything Connected" model, the demands placed on cyber security will be the principle concern of users when considering adoption. In this new era the logical point of protection will be the communications infrastructure that forms the connected web. As such, Cisco Systems is funding research and driving innovation in network based cyber security. The initial thrust of this effort is focused on cryptography, data analytics and privacy, platform protection and threat awareness. This discussion will focus on what Cisco is presently doing in Advanced Security Research. The current global engagements, future needs and likely methodologies.
随着技术加速向“万物互联”模式发展,对网络安全的需求将成为用户在考虑采用时首要考虑的问题。在这个新时代,合乎逻辑的保护点将是构成互联网络的通信基础设施。因此,思科系统正在资助研究并推动基于网络的网络安全创新。这项工作最初的重点是密码学、数据分析和隐私、平台保护和威胁意识。本讨论将集中于思科目前在高级安全研究方面所做的工作。当前的全球参与,未来的需求和可能的方法。
{"title":"Advanced Security Research in the Era of the Internet of Things","authors":"G. Akers","doi":"10.1145/3052973.3053887","DOIUrl":"https://doi.org/10.1145/3052973.3053887","url":null,"abstract":"As the evolution of technology accelerates toward the \"Everything Connected\" model, the demands placed on cyber security will be the principle concern of users when considering adoption. In this new era the logical point of protection will be the communications infrastructure that forms the connected web. As such, Cisco Systems is funding research and driving innovation in network based cyber security. The initial thrust of this effort is focused on cryptography, data analytics and privacy, platform protection and threat awareness. This discussion will focus on what Cisco is presently doing in Advanced Security Research. The current global engagements, future needs and likely methodologies.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78791972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage 利用电网电压控制时钟同步的非对称网络延迟
Dima Rabadi, Rui Tan, David K. Y. Yau, S. Viswanathan
Many clock synchronization protocols based on message passing, e.g., the Network Time Protocol (NTP), assume symmetric network delays to estimate the one-way packet transmission time as half of the round-trip time. As a result, asymmetric network delays caused by either %natural one-way network congestion or malicious packet delays can cause significant synchronization errors. This paper exploits sinusoidal voltage signals of an alternating current (ac) power grid to tame the asymmetric network delays for robust and resilient clock synchronization. Our extensive measurements show that the voltage signals at geographically distributed locations in a city are highly synchronized. Leveraging calibrated voltage phases, we develop a new clock synchronization protocol, which we call Grid Time Protocol (GTP), that allows direct measurement of one-way packet transmission times between its slave and master nodes, under an analytic condition that can be easily verified in practice. The direct measurements render GTP resilient against asymmetric network delays under this condition. A prototype implementation of GTP, based on readily available ac/ac transformers and PC-grade sound cards as voltage signal sampling devices, maintains sub-ms synchronization accuracy for two nodes 30 km apart, in the presence of malicious packet delays. We believe that GTP is suitable for grid-connected distributed systems that are currently served by NTP but desire higher resilience against network dynamics and packet delay attacks.
许多基于消息传递的时钟同步协议,例如网络时间协议(NTP),假设对称网络延迟来估计单向数据包传输时间为往返时间的一半。因此,由%自然单向网络拥塞或恶意数据包延迟引起的非对称网络延迟可能导致严重的同步错误。本文利用交流电网的正弦电压信号来抑制非对称网络延迟,实现鲁棒和弹性时钟同步。我们广泛的测量表明,在一个城市的地理分布位置的电压信号是高度同步的。利用校准的电压相位,我们开发了一种新的时钟同步协议,我们称之为网格时间协议(GTP),它允许在易于在实践中验证的分析条件下直接测量其从节点和主节点之间的单向数据包传输时间。在这种情况下,直接测量使GTP具有抗非对称网络延迟的弹性。GTP的原型实现基于现成的交流/交流变压器和pc级声卡作为电压信号采样设备,在存在恶意数据包延迟的情况下,相距30公里的两个节点保持低于ms的同步精度。我们认为GTP适用于目前由NTP提供服务的并网分布式系统,但需要更高的抗网络动态和数据包延迟攻击的弹性。
{"title":"Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage","authors":"Dima Rabadi, Rui Tan, David K. Y. Yau, S. Viswanathan","doi":"10.1145/3052973.3053020","DOIUrl":"https://doi.org/10.1145/3052973.3053020","url":null,"abstract":"Many clock synchronization protocols based on message passing, e.g., the Network Time Protocol (NTP), assume symmetric network delays to estimate the one-way packet transmission time as half of the round-trip time. As a result, asymmetric network delays caused by either %natural one-way network congestion or malicious packet delays can cause significant synchronization errors. This paper exploits sinusoidal voltage signals of an alternating current (ac) power grid to tame the asymmetric network delays for robust and resilient clock synchronization. Our extensive measurements show that the voltage signals at geographically distributed locations in a city are highly synchronized. Leveraging calibrated voltage phases, we develop a new clock synchronization protocol, which we call Grid Time Protocol (GTP), that allows direct measurement of one-way packet transmission times between its slave and master nodes, under an analytic condition that can be easily verified in practice. The direct measurements render GTP resilient against asymmetric network delays under this condition. A prototype implementation of GTP, based on readily available ac/ac transformers and PC-grade sound cards as voltage signal sampling devices, maintains sub-ms synchronization accuracy for two nodes 30 km apart, in the presence of malicious packet delays. We believe that GTP is suitable for grid-connected distributed systems that are currently served by NTP but desire higher resilience against network dynamics and packet delay attacks.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75028842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Detection of Information Leaks via Reflection in Android Apps 基于Android应用反射的信息泄漏检测
Jyoti Gajrani, Li Li, V. Laxmi, Meenakshi Tripathi, M. Gaur, M. Conti
Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing reflection. We evaluate EspyDroid on 28 benchmark apps employing major reflection categories. Our technique show improved results over FlowDroid via detection of additional undetected flows. These flows have potential to leak sensitive and private information of the users, through various sinks.
反射是一种语言特性,允许在运行时分析和转换类的行为。反射用于软件调试和测试。恶意软件作者可以利用反射来破坏静态分析器的恶意软件检测。反射初始化类、调用类的任何方法或访问类的任何字段。但是,反射没有使用通常的编程语言语法,而是将类/方法等作为参数传递给反射api。因此,这些参数可以动态构造,也可以被恶意软件加密。最先进的静态工具无法检测到这些。我们提出EspyDroid,这是一个将动态分析与代码检测相结合的系统,可以更精确地自动检测恶意软件。我们在28个采用主要反射类别的基准应用程序上对EspyDroid进行了评估。通过检测额外的未检测到的流量,我们的技术比FlowDroid的结果更好。这些流有可能通过各种汇合点泄露用户的敏感和私人信息。
{"title":"Detection of Information Leaks via Reflection in Android Apps","authors":"Jyoti Gajrani, Li Li, V. Laxmi, Meenakshi Tripathi, M. Gaur, M. Conti","doi":"10.1145/3052973.3055162","DOIUrl":"https://doi.org/10.1145/3052973.3055162","url":null,"abstract":"Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing reflection. We evaluate EspyDroid on 28 benchmark apps employing major reflection categories. Our technique show improved results over FlowDroid via detection of additional undetected flows. These flows have potential to leak sensitive and private information of the users, through various sinks.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82402507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Session details: Web & Network Security 会议细节:Web和网络安全
C. Pöpper
{"title":"Session details: Web & Network Security","authors":"C. Pöpper","doi":"10.1145/3248565","DOIUrl":"https://doi.org/10.1145/3248565","url":null,"abstract":"","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77226427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DoS Attacks on Your Memory in Cloud DoS攻击你的云内存
Tianwei Zhang, Yinqian Zhang, R. Lee
In cloud computing, network Denial of Service (DoS) attacks are well studied and defenses have been implemented, but severe DoS attacks on a victim's working memory by a single hostile VM are not well understood. Memory DoS attacks are Denial of Service (or Degradation of Service) attacks caused by contention for hardware memory resources on a cloud server. Despite the strong memory isolation techniques for virtual machines (VMs) enforced by the software virtualization layer in cloud servers, the underlying hardware memory layers are still shared by the VMs and can be exploited by a clever attacker in a hostile VM co-located on the same server as the victim VM, denying the victim the working memory he needs. We first show quantitatively the severity of contention on different memory resources. We then show that a malicious cloud customer can mount low-cost attacks to cause severe performance degradation for a Hadoop distributed application, and 38X delay in response time for an E-commerce website in the Amazon EC2 cloud. Then, we design an effective, new defense against these memory DoS attacks, using a statistical metric to detect their existence and execution throttling to mitigate the attack damage. We achieve this by a novel re-purposing of existing hardware performance counters and duty cycle modulation for security, rather than for improving performance or power consumption. We implement a full prototype on the OpenStack cloud system. Our evaluations show that this defense system can effectively defeat memory DoS attacks with negligible performance overhead.
在云计算中,网络拒绝服务(DoS)攻击已经得到了很好的研究,防御措施也已经实施,但是单个恶意虚拟机对受害者工作记忆的严重DoS攻击还没有得到很好的理解。内存DoS攻击是由于云服务器上的硬件内存资源争用而导致的拒绝服务(或服务退化)攻击。尽管云服务器中的软件虚拟化层为虚拟机(VM)提供了强大的内存隔离技术,但底层硬件内存层仍然由VM共享,并且可以被聪明的攻击者在与受害者VM位于同一服务器上的恶意VM中利用,从而拒绝受害者所需的工作内存。我们首先定量地展示了不同内存资源上争用的严重程度。然后,我们展示了恶意的云客户可以发起低成本的攻击,导致Hadoop分布式应用程序的严重性能下降,并使亚马逊EC2云中的电子商务网站的响应时间延迟38倍。然后,我们设计了一个有效的,针对这些内存DoS攻击的新防御,使用统计度量来检测它们的存在和执行限制来减轻攻击损害。我们通过对现有硬件性能计数器和占空比调制的新颖重新利用来实现这一目标,以提高安全性,而不是提高性能或功耗。我们在OpenStack云系统上实现了一个完整的原型。我们的评估表明,这种防御系统可以有效地击败内存DoS攻击,而性能开销可以忽略不计。
{"title":"DoS Attacks on Your Memory in Cloud","authors":"Tianwei Zhang, Yinqian Zhang, R. Lee","doi":"10.1145/3052973.3052978","DOIUrl":"https://doi.org/10.1145/3052973.3052978","url":null,"abstract":"In cloud computing, network Denial of Service (DoS) attacks are well studied and defenses have been implemented, but severe DoS attacks on a victim's working memory by a single hostile VM are not well understood. Memory DoS attacks are Denial of Service (or Degradation of Service) attacks caused by contention for hardware memory resources on a cloud server. Despite the strong memory isolation techniques for virtual machines (VMs) enforced by the software virtualization layer in cloud servers, the underlying hardware memory layers are still shared by the VMs and can be exploited by a clever attacker in a hostile VM co-located on the same server as the victim VM, denying the victim the working memory he needs. We first show quantitatively the severity of contention on different memory resources. We then show that a malicious cloud customer can mount low-cost attacks to cause severe performance degradation for a Hadoop distributed application, and 38X delay in response time for an E-commerce website in the Amazon EC2 cloud. Then, we design an effective, new defense against these memory DoS attacks, using a statistical metric to detect their existence and execution throttling to mitigate the attack damage. We achieve this by a novel re-purposing of existing hardware performance counters and duty cycle modulation for security, rather than for improving performance or power consumption. We implement a full prototype on the OpenStack cloud system. Our evaluations show that this defense system can effectively defeat memory DoS attacks with negligible performance overhead.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85316926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1