首页 > 最新文献

Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security最新文献

英文 中文
DRIVE: Dynamic Runtime Integrity Verification and Evaluation 驱动:动态运行时完整性验证和评估
André Rein
Classic security techniques use patterns (e.g., virus scanner) for detecting malicious software, compiler features (e.g., canaries, tainting) or hardware memory protection features (e.g., DEP) for protecting software. An alternative approach is the verification of software based on the comparison between the binary code loaded before runtime and the actual memory image during runtime. The expected memory image is predictable based on the ELF-file, the loading mechanism, and its allocated memory addresses. Using binary files as references for verifying the memory during execution allows for the definition of white-lists based on the actual software used. This enables a novel way of detecting sophisticated attacks to executed code, which is not considered by current approaches. This paper presents the background, design, implementation, and verification of a non-intrusive runtime memory verification concept, which is based on the comparison of binary executables and the actual memory image.
经典的安全技术使用模式(例如,病毒扫描程序)来检测恶意软件,使用编译器功能(例如,金丝雀,污染)或使用硬件内存保护功能(例如,DEP)来保护软件。另一种方法是基于运行时之前加载的二进制代码与运行时期间的实际内存映像之间的比较来验证软件。根据elf文件、加载机制及其分配的内存地址,可以预测预期的内存映像。使用二进制文件作为执行期间验证内存的参考,可以根据实际使用的软件定义白名单。这提供了一种新的方法来检测对已执行代码的复杂攻击,这是当前方法没有考虑到的。本文介绍了一种基于二进制可执行文件和实际内存映像比较的非侵入式运行时内存验证概念的背景、设计、实现和验证。
{"title":"DRIVE: Dynamic Runtime Integrity Verification and Evaluation","authors":"André Rein","doi":"10.1145/3052973.3052975","DOIUrl":"https://doi.org/10.1145/3052973.3052975","url":null,"abstract":"Classic security techniques use patterns (e.g., virus scanner) for detecting malicious software, compiler features (e.g., canaries, tainting) or hardware memory protection features (e.g., DEP) for protecting software. An alternative approach is the verification of software based on the comparison between the binary code loaded before runtime and the actual memory image during runtime. The expected memory image is predictable based on the ELF-file, the loading mechanism, and its allocated memory addresses. Using binary files as references for verifying the memory during execution allows for the definition of white-lists based on the actual software used. This enables a novel way of detecting sophisticated attacks to executed code, which is not considered by current approaches. This paper presents the background, design, implementation, and verification of a non-intrusive runtime memory verification concept, which is based on the comparison of binary executables and the actual memory image.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82041993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PayBreak: Defense Against Cryptographic Ransomware PayBreak:防御加密勒索软件
Eugene Kolodenker, W. Koch, G. Stringhini, Manuel Egele
Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral means to achieve monetary gains. Recently, malware known as ransomware started to leverage strong cryptographic primitives to hold victims' computer files "hostage" until a ransom is paid. Victims, with no way to defend themselves, are often advised to simply pay. Existing defenses against ransomware rely on ad-hoc mitigations that target the incorrect use of cryptography rather than generic live protection. To fill this gap in the defender's arsenal, we describe the approach, prototype implementation, and evaluation of a novel, automated, and most importantly proactive defense mechanism against ransomware. Our prototype, called PayBreak, effectively combats ransomware, and keeps victims' files safe. PayBreak is based on the insight that secure file encryption relies on hybrid encryption where symmetric session keys are used on the victim computer. PayBreak observes the use of these keys, holds them in escrow, and thus, can decrypt files that would otherwise only be recoverable by paying the ransom. Our prototype leverages low overhead dynamic hooking techniques and asymmetric encryption to realize the key escrow mechanism which allows victims to restore the files encrypted by ransomware. We evaluated PayBreak for its effectiveness against twenty hugely successful families of real-world ransomware, and demonstrate that our system can restore all files that are encrypted by samples from twelve of these families, including the infamous CryptoLocker, and more recent threats such as Locky and SamSam. Finally, PayBreak performs its protection task at negligible performance overhead for common office workloads and is thus ideally suited as a proactive online protection system.
与现实世界中的犯罪分子类似,网络犯罪分子使用各种非法和不道德的手段来获得金钱利益。最近,被称为勒索软件的恶意软件开始利用强大的加密原语将受害者的计算机文件作为“人质”,直到支付赎金。受害者没有办法为自己辩护,通常被建议干脆付钱。针对勒索软件的现有防御依赖于针对不正确使用加密的临时缓解措施,而不是通用的实时保护。为了填补防御者武器库中的这一空白,我们描述了一种新的、自动化的、最重要的、针对勒索软件的主动防御机制的方法、原型实现和评估。我们的原型名为PayBreak,它能有效地打击勒索软件,并保护受害者的文件安全。PayBreak基于安全文件加密依赖于混合加密的洞察力,其中对称会话密钥在受害计算机上使用。PayBreak观察这些密钥的使用,并将其托管,因此可以解密只有通过支付赎金才能恢复的文件。我们的原型利用低开销的动态挂钩技术和非对称加密来实现密钥托管机制,允许受害者恢复被勒索软件加密的文件。我们评估了PayBreak对20个非常成功的现实世界勒索软件家族的有效性,并证明我们的系统可以恢复由其中12个家族的样本加密的所有文件,包括臭名昭著的CryptoLocker,以及最近的威胁,如Locky和SamSam。最后,PayBreak以可忽略的性能开销为常见的办公负载执行其保护任务,因此非常适合作为主动在线保护系统。
{"title":"PayBreak: Defense Against Cryptographic Ransomware","authors":"Eugene Kolodenker, W. Koch, G. Stringhini, Manuel Egele","doi":"10.1145/3052973.3053035","DOIUrl":"https://doi.org/10.1145/3052973.3053035","url":null,"abstract":"Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral means to achieve monetary gains. Recently, malware known as ransomware started to leverage strong cryptographic primitives to hold victims' computer files \"hostage\" until a ransom is paid. Victims, with no way to defend themselves, are often advised to simply pay. Existing defenses against ransomware rely on ad-hoc mitigations that target the incorrect use of cryptography rather than generic live protection. To fill this gap in the defender's arsenal, we describe the approach, prototype implementation, and evaluation of a novel, automated, and most importantly proactive defense mechanism against ransomware. Our prototype, called PayBreak, effectively combats ransomware, and keeps victims' files safe. PayBreak is based on the insight that secure file encryption relies on hybrid encryption where symmetric session keys are used on the victim computer. PayBreak observes the use of these keys, holds them in escrow, and thus, can decrypt files that would otherwise only be recoverable by paying the ransom. Our prototype leverages low overhead dynamic hooking techniques and asymmetric encryption to realize the key escrow mechanism which allows victims to restore the files encrypted by ransomware. We evaluated PayBreak for its effectiveness against twenty hugely successful families of real-world ransomware, and demonstrate that our system can restore all files that are encrypted by samples from twelve of these families, including the infamous CryptoLocker, and more recent threats such as Locky and SamSam. Finally, PayBreak performs its protection task at negligible performance overhead for common office workloads and is thus ideally suited as a proactive online protection system.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83341624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 188
Session details: Applied Crypto 会话详细信息:应用加密
Frederik Armknecht
{"title":"Session details: Applied Crypto","authors":"Frederik Armknecht","doi":"10.1145/3248564","DOIUrl":"https://doi.org/10.1145/3248564","url":null,"abstract":"","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83739744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MoPS: A Modular Protection Scheme for Long-Term Storage MoPS:长期存储的模块化保护方案
Christian Weinert, Denise Demirel, M. Vigil, Matthias Geihs, J. Buchmann
Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes that ensure security even in the long-term, i.e. beyond the lifetime of keys, certificates, and cryptographic primitives. However, all current solutions fail to provide optimal performance for different application scenarios. Thus, in this work, we present MoPS, a modular protection scheme to ensure authenticity and integrity for data stored over long periods of time. MoPS does not come with any requirements regarding the storage architecture and can therefore be used together with existing archiving or storage systems. It supports a set of techniques which can be plugged together, combined, and migrated in order to create customized solutions that fulfill the requirements of different application scenarios in the best possible way. As a proof of concept we implemented MoPS and provide performance measurements. Furthermore, our implementation provides additional features, such as guidance for non-expert users and export functionalities for external verifiers.
当前的技术趋势,例如云计算,允许将数据的存储、备份和归档外包。这提供了效率和灵活性,但也给数据安全带来了新的风险。尤其重要的是,开发能够确保长期安全的保护方案,即超越密钥、证书和加密原语的生命周期。然而,目前所有的解决方案都不能为不同的应用场景提供最佳的性能。因此,在这项工作中,我们提出了MoPS,一种模块化的保护方案,以确保长时间存储数据的真实性和完整性。MoPS没有任何关于存储体系结构的要求,因此可以与现有的归档或存储系统一起使用。它支持一组可以插在一起、组合和迁移的技术,以便创建定制的解决方案,以最佳方式满足不同应用程序场景的需求。作为概念验证,我们实现了MoPS并提供了性能测量。此外,我们的实现提供了额外的特性,例如针对非专业用户的指导,以及针对外部验证者的导出功能。
{"title":"MoPS: A Modular Protection Scheme for Long-Term Storage","authors":"Christian Weinert, Denise Demirel, M. Vigil, Matthias Geihs, J. Buchmann","doi":"10.1145/3052973.3053025","DOIUrl":"https://doi.org/10.1145/3052973.3053025","url":null,"abstract":"Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes that ensure security even in the long-term, i.e. beyond the lifetime of keys, certificates, and cryptographic primitives. However, all current solutions fail to provide optimal performance for different application scenarios. Thus, in this work, we present MoPS, a modular protection scheme to ensure authenticity and integrity for data stored over long periods of time. MoPS does not come with any requirements regarding the storage architecture and can therefore be used together with existing archiving or storage systems. It supports a set of techniques which can be plugged together, combined, and migrated in order to create customized solutions that fulfill the requirements of different application scenarios in the best possible way. As a proof of concept we implemented MoPS and provide performance measurements. Furthermore, our implementation provides additional features, such as guidance for non-expert users and export functionalities for external verifiers.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73662155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System 大型空中交通监视系统中欺骗装置的定位
K. Jansen, Matthias Schäfer, Vincent Lenders, C. Pöpper, J. Schmitt
Systems relying on satellite positioning techniques such as GPS can be targeted by spoofing attacks, where attackers try to inject fake positioning information. With the growing spread of flying drones and their usage of GPS for localization, these systems become interesting targets of attacks with the purpose of hijacking or to distract air safety surveillance. The most recent development in air traffic surveillance is the automatic dependent surveillance -- broadcast (ADS-B). Aircraft periodically broadcast their location, speed, or environmental measurements via ADS-B. The open research project OpenSky Network collects ADS-B reports and makes them available for research purposes. This poster presents a concept to detect and localize spoofing devices by utilizing the information provided by a large-scale air traffic surveillance system. We utilize ADS-B reports collected by the OpenSky Network and provide first results on the effectiveness of localizing spoofing sources.
依靠GPS等卫星定位技术的系统可能成为欺骗攻击的目标,攻击者试图注入虚假的定位信息。随着无人机的日益普及,以及它们使用GPS进行定位,这些系统成为攻击的有趣目标,目的是劫持或分散空中安全监视。空中交通监视的最新发展是自动依赖监视-广播(ADS-B)。飞机定期通过ADS-B广播它们的位置、速度或环境测量值。开放研究项目OpenSky Network收集ADS-B报告,并将其用于研究目的。这张海报提出了一种利用大型空中交通监视系统提供的信息来检测和定位欺骗设备的概念。我们利用OpenSky网络收集的ADS-B报告,并提供了定位欺骗源有效性的初步结果。
{"title":"Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System","authors":"K. Jansen, Matthias Schäfer, Vincent Lenders, C. Pöpper, J. Schmitt","doi":"10.1145/3052973.3055158","DOIUrl":"https://doi.org/10.1145/3052973.3055158","url":null,"abstract":"Systems relying on satellite positioning techniques such as GPS can be targeted by spoofing attacks, where attackers try to inject fake positioning information. With the growing spread of flying drones and their usage of GPS for localization, these systems become interesting targets of attacks with the purpose of hijacking or to distract air safety surveillance. The most recent development in air traffic surveillance is the automatic dependent surveillance -- broadcast (ADS-B). Aircraft periodically broadcast their location, speed, or environmental measurements via ADS-B. The open research project OpenSky Network collects ADS-B reports and makes them available for research purposes. This poster presents a concept to detect and localize spoofing devices by utilizing the information provided by a large-scale air traffic surveillance system. We utilize ADS-B reports collected by the OpenSky Network and provide first results on the effectiveness of localizing spoofing sources.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72966559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks PrivWatcher:不可绕过的监控和保护进程凭证从内存损坏攻击
Quan Chen, Ahmed M. Azab, G. Ganesh, P. Ning
Commodity operating systems kernels are typically implemented using low-level unsafe languages, which leads to the inevitability of memory corruption vulnerabilities. Multiple defense techniques are widely adopted to mitigate the impact of memory corruption on executable code and control data. Nevertheless, there has not been much attention to defend against corruption of non-control data despite the fact that previous incidents of kernel exploitation showed that corrupting non-control data is a real threat. We present PrivWatcher, a framework for monitoring and protecting the integrity of process credentials and their usage contexts from memory corruption attacks. PrivWatcher solves multiple challenges to achieve this objective. It introduces techniques to isolate and protect the data that define process credentials and guarantee the locality of this data within the protected memory. Then, by adopting a dual reference monitor model, it guarantees the Time of Check To Time of Use (TOCTTOU) consistency between verification and usage contexts for process credentials. Moreover, it provides a secure mechanism that allows the presumably protected kernel code to verify the protected data without relying on unprotected data fields. PrivWatcher provides non-bypassable integrity assurances for process credentials and can be adapted to enforce a variety of integrity policies. In this paper, we demonstrate an application of PrivWatcher that enforces the original semantics of the OS kernel's access control policy: a change in process privileges is legitimate only if an uncompromised kernel would have allowed it. We implemented a PrivWatcher prototype to protect Ubuntu Linux running on x86-64. Evaluation of our prototype showed that PrivWatcher is effective and efficient.
商品操作系统内核通常使用低级不安全语言实现,这将不可避免地导致内存损坏漏洞。多种防御技术被广泛采用,以减轻内存损坏对可执行代码和控制数据的影响。然而,尽管以前的内核利用事件表明破坏非控制数据是一个真正的威胁,但对防止非控制数据损坏的关注并不多。我们提出了PrivWatcher,一个框架,用于监控和保护进程凭据的完整性及其使用上下文免受内存损坏攻击。PrivWatcher解决了多个挑战来实现这一目标。它介绍了隔离和保护定义进程凭证的数据的技术,并保证这些数据在受保护的内存中的位置。然后,通过采用双参考监控模型,保证了进程凭证的验证上下文和使用上下文之间从检查时间到使用时间(TOCTTOU)的一致性。此外,它还提供了一种安全机制,允许假定受保护的内核代码验证受保护的数据,而不依赖于不受保护的数据字段。PrivWatcher为进程凭证提供了不可绕过的完整性保证,并且可以用于执行各种完整性策略。在本文中,我们演示了PrivWatcher的一个应用程序,它执行了操作系统内核访问控制策略的原始语义:只有在未妥协的内核允许的情况下,进程特权的更改才是合法的。我们实现了PrivWatcher原型来保护运行在x86-64上的Ubuntu Linux。我们对原型的评估表明PrivWatcher是有效的。
{"title":"PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks","authors":"Quan Chen, Ahmed M. Azab, G. Ganesh, P. Ning","doi":"10.1145/3052973.3053029","DOIUrl":"https://doi.org/10.1145/3052973.3053029","url":null,"abstract":"Commodity operating systems kernels are typically implemented using low-level unsafe languages, which leads to the inevitability of memory corruption vulnerabilities. Multiple defense techniques are widely adopted to mitigate the impact of memory corruption on executable code and control data. Nevertheless, there has not been much attention to defend against corruption of non-control data despite the fact that previous incidents of kernel exploitation showed that corrupting non-control data is a real threat. We present PrivWatcher, a framework for monitoring and protecting the integrity of process credentials and their usage contexts from memory corruption attacks. PrivWatcher solves multiple challenges to achieve this objective. It introduces techniques to isolate and protect the data that define process credentials and guarantee the locality of this data within the protected memory. Then, by adopting a dual reference monitor model, it guarantees the Time of Check To Time of Use (TOCTTOU) consistency between verification and usage contexts for process credentials. Moreover, it provides a secure mechanism that allows the presumably protected kernel code to verify the protected data without relying on unprotected data fields. PrivWatcher provides non-bypassable integrity assurances for process credentials and can be adapted to enforce a variety of integrity policies. In this paper, we demonstrate an application of PrivWatcher that enforces the original semantics of the OS kernel's access control policy: a change in process privileges is legitimate only if an uncompromised kernel would have allowed it. We implemented a PrivWatcher prototype to protect Ubuntu Linux running on x86-64. Evaluation of our prototype showed that PrivWatcher is effective and efficient.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78696069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Sharing Proofs of Retrievability across Tenants 跨租户共享可检索性证明
Frederik Armknecht, J. Bohli, D. Froelicher, Ghassan O. Karame
Proofs of Retrievability (POR) are cryptographic proofs which provide assurance to a single tenant (who creates tags using his secret material) that his files can be retrieved in their entirety. However, POR schemes completely ignore storage-efficiency concepts, such as multi-tenancy and data deduplication, which are being widely utilized by existing cloud storage providers. Namely, in deduplicated storage systems, existing POR schemes would incur an additional overhead for storing tenants' tags which grows linearly with the number of users deduplicating the same file. This overhead clearly reduces the (economic) incentives of cloud providers to integrate existing POR/PDP solutions in their offerings. In this paper, we propose a novel storage-efficient POR, dubbed SPORT, which transparently supports multi-tenancy and data deduplication. More specifically, SPORT enables tenants to securely share the same POR tags in order to verify the integrity of their deduplicated files. By doing so, SPORT considerably reduces the storage overhead borne by cloud providers when storing the tags of different tenants deduplicating the same content. We show that SPORT resists against malicious tenants/cloud providers (and against collusion among a subset of the tenants and the cloud). Finally, we implement a prototype based on SPORT, and evaluate its performance in a realistic cloud setting. Our evaluation results show that our proposal incurs tolerable computational overhead on the tenants and the cloud provider.
可检索性证明(POR)是一种加密证明,它为单个租户(使用其秘密材料创建标记的人)提供保证,使其文件可以完整地检索。但是,POR方案完全忽略了存储效率的概念,例如多租户和重复数据删除,这些概念正在被现有的云存储提供商广泛使用。也就是说,在重复数据删除存储系统中,现有的POR方案会导致存储租户标记的额外开销,这种开销会随着重复数据删除同一文件的用户数量的增加而线性增长。这种开销显然降低了云提供商在其产品中集成现有POR/PDP解决方案的(经济)动机。在本文中,我们提出了一种新的存储效率高的POR,称为SPORT,它透明地支持多租户和重复数据删除。更具体地说,SPORT使租户能够安全地共享相同的POR标记,以便验证其重复数据删除文件的完整性。通过这样做,SPORT在存储重复数据删除相同内容的不同租户的标记时,大大减少了云提供商承担的存储开销。我们展示了SPORT可以抵抗恶意租户/云提供商(以及租户和云的子集之间的勾结)。最后,我们实现了一个基于SPORT的原型,并在一个真实的云环境中评估了它的性能。我们的评估结果表明,我们的建议给租户和云提供商带来了可容忍的计算开销。
{"title":"Sharing Proofs of Retrievability across Tenants","authors":"Frederik Armknecht, J. Bohli, D. Froelicher, Ghassan O. Karame","doi":"10.1145/3052973.3052997","DOIUrl":"https://doi.org/10.1145/3052973.3052997","url":null,"abstract":"Proofs of Retrievability (POR) are cryptographic proofs which provide assurance to a single tenant (who creates tags using his secret material) that his files can be retrieved in their entirety. However, POR schemes completely ignore storage-efficiency concepts, such as multi-tenancy and data deduplication, which are being widely utilized by existing cloud storage providers. Namely, in deduplicated storage systems, existing POR schemes would incur an additional overhead for storing tenants' tags which grows linearly with the number of users deduplicating the same file. This overhead clearly reduces the (economic) incentives of cloud providers to integrate existing POR/PDP solutions in their offerings. In this paper, we propose a novel storage-efficient POR, dubbed SPORT, which transparently supports multi-tenancy and data deduplication. More specifically, SPORT enables tenants to securely share the same POR tags in order to verify the integrity of their deduplicated files. By doing so, SPORT considerably reduces the storage overhead borne by cloud providers when storing the tags of different tenants deduplicating the same content. We show that SPORT resists against malicious tenants/cloud providers (and against collusion among a subset of the tenants and the cloud). Finally, we implement a prototype based on SPORT, and evaluate its performance in a realistic cloud setting. Our evaluation results show that our proposal incurs tolerable computational overhead on the tenants and the cloud provider.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77214718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption 标准假设下素数组中具有短密文的高效KP-ABE
Jongkil Kim, W. Susilo, F. Guo, M. Au, S. Nepal
We introduce an efficient Key-Policy Attribute-Based Encryption (KP-ABE) scheme in prime order groups. Our scheme is semi-adaptively secure under the decisional linear assumption and supports a large universe of attributes and multi-use of attributes. Those properties are critical for real applications of KP-ABE schemes since they enable an efficient and flexible access control. Prior to our work, existing KP-ABE schemes with short ciphertexts were in composite order groups or utilized either Dual Pairing Vector Spaces (DPVS) or Dual System Groups (DSG) in prime order groups. However, those techniques brought an efficiency loss. In this work, we utilize a nested dual system encryption which is a variant of Waters' dual system encryption (Crypto' 09) to achieve semi-adaptively secure KP-ABE. As a result, we obtain a new scheme having better efficiency compared to existing schemes while it keeps a semi-adaptive security under the standard assumption. We implement our scheme and compare its efficiency with the previous best work.
提出了一种高效的基于密钥策略属性的素序群加密方案。该方案在决策线性假设下是半自适应安全的,支持大范围的属性和属性的多用途。这些属性对于KP-ABE方案的实际应用至关重要,因为它们能够实现高效灵活的访问控制。在我们的工作之前,现有的具有短密文的KP-ABE方案是在复合序群中或在素序群中使用对偶向量空间(DPVS)或对偶系统群(DSG)。然而,这些技术带来了效率损失。在这项工作中,我们利用嵌套双系统加密,这是Waters的双系统加密(Crypto' 09)的一种变体,以实现半自适应安全KP-ABE。结果表明,在标准假设下,新方案在保持半自适应安全性的同时,比现有方案具有更高的效率。我们实施了我们的方案,并将其效率与以前的最佳工作进行了比较。
{"title":"An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption","authors":"Jongkil Kim, W. Susilo, F. Guo, M. Au, S. Nepal","doi":"10.1145/3052973.3053003","DOIUrl":"https://doi.org/10.1145/3052973.3053003","url":null,"abstract":"We introduce an efficient Key-Policy Attribute-Based Encryption (KP-ABE) scheme in prime order groups. Our scheme is semi-adaptively secure under the decisional linear assumption and supports a large universe of attributes and multi-use of attributes. Those properties are critical for real applications of KP-ABE schemes since they enable an efficient and flexible access control. Prior to our work, existing KP-ABE schemes with short ciphertexts were in composite order groups or utilized either Dual Pairing Vector Spaces (DPVS) or Dual System Groups (DSG) in prime order groups. However, those techniques brought an efficiency loss. In this work, we utilize a nested dual system encryption which is a variant of Waters' dual system encryption (Crypto' 09) to achieve semi-adaptively secure KP-ABE. As a result, we obtain a new scheme having better efficiency compared to existing schemes while it keeps a semi-adaptive security under the standard assumption. We implement our scheme and compare its efficiency with the previous best work.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81204319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu 利用d<s:1> joxvu检测屏蔽执行中的特权侧信道攻击
Sanchuan Chen, Xiaokuan Zhang, M. Reiter, Yinqian Zhang
Intel Software Guard Extension (SGX) protects the confidentiality and integrity of an unprivileged program running inside a secure enclave from a privileged attacker who has full control of the entire operating system (OS). Program execution inside this enclave is therefore referred to as shielded. Unfortunately, shielded execution does not protect programs from side-channel attacks by a privileged attacker. For instance, it has been shown that by changing page table entries of memory pages used by shielded execution, a malicious OS kernel could observe memory page accesses from the execution and hence infer a wide range of sensitive information about it. In fact, this page-fault side channel is only an instance of a category of side-channel attacks, here called privileged side-channel attacks, in which privileged attackers frequently preempt the shielded execution to obtain fine-grained side-channel observations. In this paper, we present Deja Vu, a software framework that enables a shielded execution to detect such privileged side-channel attacks. Specifically, we build into shielded execution the ability to check program execution time at the granularity of paths in its control-flow graph. To provide a trustworthy source of time measurement, Deja Vu implements a novel software reference clock that is protected by Intel Transactional Synchronization Extensions (TSX), a hardware implementation of transactional memory. Evaluations show that Deja Vu effectively detects side-channel attacks against shielded execution and against the reference clock itself.
Intel Software Guard Extension (SGX)保护在安全飞地内运行的非特权程序的机密性和完整性,免受完全控制整个操作系统(OS)的特权攻击者的攻击。因此,在这个飞地内执行的程序被称为屏蔽的。不幸的是,屏蔽执行不能保护程序免受特权攻击者的侧通道攻击。例如,有研究表明,通过更改屏蔽执行所使用的内存页的页表项,恶意的OS内核可以从执行中观察到内存页的访问,从而推断出关于它的大量敏感信息。实际上,这种页错误侧通道只是侧通道攻击的一个实例,这里称为特权侧通道攻击,特权攻击者经常抢占屏蔽执行以获得细粒度的侧通道观察结果。在本文中,我们提出了Deja Vu,一个软件框架,使屏蔽执行能够检测这种特权侧信道攻击。具体来说,我们在屏蔽执行中构建了以控制流图中路径粒度检查程序执行时间的能力。为了提供可靠的时间测量源,Deja Vu实现了一种新颖的软件参考时钟,该时钟受英特尔事务性同步扩展(TSX)的保护,TSX是事务性内存的硬件实现。评估表明,Deja Vu有效地检测针对屏蔽执行和参考时钟本身的侧信道攻击。
{"title":"Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu","authors":"Sanchuan Chen, Xiaokuan Zhang, M. Reiter, Yinqian Zhang","doi":"10.1145/3052973.3053007","DOIUrl":"https://doi.org/10.1145/3052973.3053007","url":null,"abstract":"Intel Software Guard Extension (SGX) protects the confidentiality and integrity of an unprivileged program running inside a secure enclave from a privileged attacker who has full control of the entire operating system (OS). Program execution inside this enclave is therefore referred to as shielded. Unfortunately, shielded execution does not protect programs from side-channel attacks by a privileged attacker. For instance, it has been shown that by changing page table entries of memory pages used by shielded execution, a malicious OS kernel could observe memory page accesses from the execution and hence infer a wide range of sensitive information about it. In fact, this page-fault side channel is only an instance of a category of side-channel attacks, here called privileged side-channel attacks, in which privileged attackers frequently preempt the shielded execution to obtain fine-grained side-channel observations. In this paper, we present Deja Vu, a software framework that enables a shielded execution to detect such privileged side-channel attacks. Specifically, we build into shielded execution the ability to check program execution time at the granularity of paths in its control-flow graph. To provide a trustworthy source of time measurement, Deja Vu implements a novel software reference clock that is protected by Intel Transactional Synchronization Extensions (TSX), a hardware implementation of transactional memory. Evaluations show that Deja Vu effectively detects side-channel attacks against shielded execution and against the reference clock itself.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79152121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 180
A Secure, Practical & Safe Packet Spoofing Service 一个安全,实用和安全的数据包欺骗服务
W. Scott
SP3 presents the design and implementation of a service to allow clients to send themselves a limited amount of network traffic from an arbitrary source IP address. Packet Spoofing is a powerful tool, although often misused, and has the potential to establish TCP connections between clients located behind NATs, to learn about network firewall policies, and to obscure communication patterns by separating source and destination. SP^3 is the first system to offer this capability as a service, while implementing safeguards to prevent malicious users from attacking others. This poster presents the design of SP^3.
SP3提供了一种服务的设计和实现,允许客户端从任意源IP地址向自己发送有限数量的网络流量。数据包欺骗是一种强大的工具,尽管经常被误用,并且有可能在位于nat后面的客户机之间建立TCP连接,了解网络防火墙策略,并通过分离源和目标来模糊通信模式。SP^3是第一个将此功能作为服务提供的系统,同时实现了防止恶意用户攻击他人的保护措施。这张海报介绍了SP^3的设计。
{"title":"A Secure, Practical & Safe Packet Spoofing Service","authors":"W. Scott","doi":"10.1145/3052973.3055155","DOIUrl":"https://doi.org/10.1145/3052973.3055155","url":null,"abstract":"SP3 presents the design and implementation of a service to allow clients to send themselves a limited amount of network traffic from an arbitrary source IP address. Packet Spoofing is a powerful tool, although often misused, and has the potential to establish TCP connections between clients located behind NATs, to learn about network firewall policies, and to obscure communication patterns by separating source and destination. SP^3 is the first system to offer this capability as a service, while implementing safeguards to prevent malicious users from attacking others. This poster presents the design of SP^3.","PeriodicalId":20540,"journal":{"name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90584372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1