首页 > 最新文献

2019 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Perun: Virtual Payment Hubs over Cryptocurrencies Perun:虚拟支付中心胜过加密货币
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00020
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
Payment channels emerged recently as an efficient method for performing cheap micropayments in cryptocurrencies. In contrast to traditional on-chain transactions, payment channels have the advantage that they allow for nearly unlimited number of transactions between parties without involving the blockchain. In this work, we introduce Perun, an off-chain channel system that offers a new method for connecting channels that is more efficient than the existing technique of ``routing transactions'' over multiple channels. To this end, Perun introduces a technique called ``virtual payment channels'' that avoids involvement of the intermediary for each individual payment. In this paper we formally model and prove security of this technique in the case of one intermediary, who can be viewed as a ``payment hub'' that has direct channels with several parties. Our scheme works over any cryptocurrency that provides Turing-complete smart contracts. As a proof of concept, we implemented Perun's smart contracts in Ethereum.
支付渠道最近成为一种用加密货币进行廉价小额支付的有效方法。与传统的链上交易相比,支付渠道的优势在于,它们允许双方之间几乎无限数量的交易,而不涉及区块链。在这项工作中,我们介绍了Perun,这是一种链下通道系统,它提供了一种连接通道的新方法,比现有的多通道“路由交易”技术更有效。为此,Perun引入了一种名为“虚拟支付渠道”的技术,避免了每笔支付的中介参与。在本文中,我们在一个中介的情况下正式建模并证明了该技术的安全性,该中介可以被视为与多方有直接渠道的“支付中心”。我们的方案适用于任何提供图灵完备智能合约的加密货币。作为概念验证,我们在以太坊实现了Perun的智能合约。
{"title":"Perun: Virtual Payment Hubs over Cryptocurrencies","authors":"Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski","doi":"10.1109/SP.2019.00020","DOIUrl":"https://doi.org/10.1109/SP.2019.00020","url":null,"abstract":"Payment channels emerged recently as an efficient method for performing cheap micropayments in cryptocurrencies. In contrast to traditional on-chain transactions, payment channels have the advantage that they allow for nearly unlimited number of transactions between parties without involving the blockchain. In this work, we introduce Perun, an off-chain channel system that offers a new method for connecting channels that is more efficient than the existing technique of ``routing transactions'' over multiple channels. To this end, Perun introduces a technique called ``virtual payment channels'' that avoids involvement of the intermediary for each individual payment. In this paper we formally model and prove security of this technique in the case of one intermediary, who can be viewed as a ``payment hub'' that has direct channels with several parties. Our scheme works over any cryptocurrency that provides Turing-complete smart contracts. As a proof of concept, we implemented Perun's smart contracts in Ethereum.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"498 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Proof-of-Stake Sidechains Proof-of-Stake Sidechains
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00040
Peter Gazi, A. Kiayias, Dionysis Zindros
Sidechains have long been heralded as the key enabler of blockchain scalability and interoperability. However, no modeling of the concept or a provably secure construction has so far been attempted. We provide the first formal definition of what a sidechain system is and how assets can be moved between sidechains securely. We put forth a security definition that augments the known transaction ledger properties of liveness and safety to hold across multiple ledgers and enhance them with a new “firewall” security property which safeguards each blockchain from its sidechains, limiting the impact of an otherwise catastrophic sidechain failure. We then provide a sidechain construction that is suitable for proof-of-stake (PoS) sidechain systems. As an exemplary concrete instantiation we present our construction for an epoch- based PoS system consistent with Ouroboros (Crypto 2017), the PoS blockchain protocol used in Cardano which is one of the largest pure PoS systems by market capitalisation, and we also comment how the construction can be adapted for other protocols such as Ouroboros Praos (Eurocrypt 2018), Ouroboros Genesis (CCS 2018), Snow White and Algorand. An important feature of our construction is merged-staking that prevents “goldfinger” attacks against a sidechain that is only carrying a small amount of stake. An important technique for pegging chains that we use in our construction is cross-chain certification which is facilitated by a novel cryptographic primitive we introduce called ad-hoc threshold multisignatures (ATMS) which may be of independent interest. We show how ATMS can be securely instantiated by regular and aggregate digital signatures as well as succinct arguments of knowledge such as STARKs and bulletproofs with varying degrees of storage efficiency.
长期以来,侧链一直被誉为区块链可扩展性和互操作性的关键推动者。然而,到目前为止,还没有尝试对该概念或可证明的安全结构进行建模。我们提供了侧链系统的第一个正式定义,以及如何在侧链之间安全地移动资产。我们提出了一个安全定义,增强了已知的交易分类账的活动性和安全性,以跨多个分类账持有,并通过一个新的“防火墙”安全属性来增强它们,该属性可以保护每个区块链免受其侧链的影响,从而限制了灾难性侧链故障的影响。然后,我们提供了一个适用于权益证明(PoS)侧链系统的侧链构造。作为一个典型的具体实例,我们提出了与Ouroboros (Crypto 2017)一致的基于时代的PoS系统的构建,该PoS区块链协议在卡尔达诺使用,是市值最大的纯PoS系统之一,我们还评论了如何将该结构适用于其他协议,如Ouroboros Praos (Eurocrypt 2018), Ouroboros Genesis (CCS 2018),白雪公主和Algorand。我们构建的一个重要特征是合并权益,它可以防止“金手指”攻击只携带少量权益的侧链。我们在构建中使用的一种重要的链标记技术是跨链认证,这是由我们引入的一种新的加密原语促进的,称为ad-hoc阈值多重签名(ATMS),这可能是独立的兴趣。我们展示了如何通过规则和聚合数字签名安全地实例化ATMS,以及具有不同存储效率程度的stark和bulletproofs等简洁的知识论证。
{"title":"Proof-of-Stake Sidechains","authors":"Peter Gazi, A. Kiayias, Dionysis Zindros","doi":"10.1109/SP.2019.00040","DOIUrl":"https://doi.org/10.1109/SP.2019.00040","url":null,"abstract":"Sidechains have long been heralded as the key enabler of blockchain scalability and interoperability. However, no modeling of the concept or a provably secure construction has so far been attempted. We provide the first formal definition of what a sidechain system is and how assets can be moved between sidechains securely. We put forth a security definition that augments the known transaction ledger properties of liveness and safety to hold across multiple ledgers and enhance them with a new “firewall” security property which safeguards each blockchain from its sidechains, limiting the impact of an otherwise catastrophic sidechain failure. We then provide a sidechain construction that is suitable for proof-of-stake (PoS) sidechain systems. As an exemplary concrete instantiation we present our construction for an epoch- based PoS system consistent with Ouroboros (Crypto 2017), the PoS blockchain protocol used in Cardano which is one of the largest pure PoS systems by market capitalisation, and we also comment how the construction can be adapted for other protocols such as Ouroboros Praos (Eurocrypt 2018), Ouroboros Genesis (CCS 2018), Snow White and Algorand. An important feature of our construction is merged-staking that prevents “goldfinger” attacks against a sidechain that is only carrying a small amount of stake. An important technique for pegging chains that we use in our construction is cross-chain certification which is facilitated by a novel cryptographic primitive we introduce called ad-hoc threshold multisignatures (ATMS) which may be of independent interest. We show how ATMS can be securely instantiated by regular and aggregate digital signatures as well as succinct arguments of knowledge such as STARKs and bulletproofs with varying degrees of storage efficiency.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125263951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 128
Towards Automated Safety Vetting of PLC Code in Real-World Plants 在实际工厂中实现PLC代码的自动化安全审查
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00034
Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, E. Shi, Sibin Mohan, K. Barton, J. Moyne, Z. Morley Mao
Safety violations in programmable logic controllers (PLCs), caused either by faults or attacks, have recently garnered significant attention. However, prior efforts at PLC code vetting suffer from many drawbacks. Static analyses and verification cause significant false positives and cannot reveal specific runtime contexts. Dynamic analyses and symbolic execution, on the other hand, fail due to their inability to handle real-world PLC programs that are event-driven and timing sensitive. In this paper, we propose VetPLC, a temporal context-aware, program analysis-based approach to produce timed event sequences that can be used for automatic safety vetting. To this end, we (a) perform static program analysis to create timed event causality graphs in order to understand causal relations among events in PLC code and (b) mine temporal invariants from data traces collected in Industrial Control System (ICS) testbeds to quantitatively gauge temporal dependencies that are constrained by machine operations. Our VetPLC prototype has been implemented in 15K lines of code. We evaluate it on 10 real-world scenarios from two different ICS settings. Our experiments show that VetPLC outperforms state-of-the-art techniques and can generate event sequences that can be used to automatically detect hidden safety violations.
可编程逻辑控制器(plc)的安全违规,由故障或攻击引起,最近引起了极大的关注。然而,之前在PLC代码审查方面的努力存在许多缺点。静态分析和验证会导致严重的误报,并且无法显示特定的运行时上下文。另一方面,动态分析和符号执行由于无法处理事件驱动和时间敏感的实际PLC程序而失败。在本文中,我们提出了VetPLC,这是一种基于时间上下文感知、程序分析的方法,用于生成可用于自动安全审查的定时事件序列。为此,我们(a)执行静态程序分析以创建定时事件因果图,以便了解PLC代码中事件之间的因果关系;(b)从工业控制系统(ICS)试验台收集的数据轨迹中挖掘时间不变量,以定量衡量受机器操作约束的时间依赖性。我们的VetPLC原型已经在15K行代码中实现。我们在来自两种不同ICS设置的10个真实场景中对其进行了评估。我们的实验表明,VetPLC优于最先进的技术,可以生成事件序列,可用于自动检测隐藏的安全违规。
{"title":"Towards Automated Safety Vetting of PLC Code in Real-World Plants","authors":"Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, E. Shi, Sibin Mohan, K. Barton, J. Moyne, Z. Morley Mao","doi":"10.1109/SP.2019.00034","DOIUrl":"https://doi.org/10.1109/SP.2019.00034","url":null,"abstract":"Safety violations in programmable logic controllers (PLCs), caused either by faults or attacks, have recently garnered significant attention. However, prior efforts at PLC code vetting suffer from many drawbacks. Static analyses and verification cause significant false positives and cannot reveal specific runtime contexts. Dynamic analyses and symbolic execution, on the other hand, fail due to their inability to handle real-world PLC programs that are event-driven and timing sensitive. In this paper, we propose VetPLC, a temporal context-aware, program analysis-based approach to produce timed event sequences that can be used for automatic safety vetting. To this end, we (a) perform static program analysis to create timed event causality graphs in order to understand causal relations among events in PLC code and (b) mine temporal invariants from data traces collected in Industrial Control System (ICS) testbeds to quantitatively gauge temporal dependencies that are constrained by machine operations. Our VetPLC prototype has been implemented in 15K lines of code. We evaluate it on 10 real-world scenarios from two different ICS settings. Our experiments show that VetPLC outperforms state-of-the-art techniques and can generate event sequences that can be used to automatically detect hidden safety violations.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"150 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy 短文本,大效应:衡量用户评论对Android应用安全和隐私的影响
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00012
Duc Cuong Nguyen, Erik Derr, M. Backes, Sven Bugiel
Application markets streamline the end-users’ task of finding and installing applications. They also form an immediate communication channel between app developers and their end-users in form of app reviews, which allow users to provide developers feedback on their apps. However, it is unclear to which extent users employ this channel to point out their security and privacy concerns about apps, about which aspects of apps users express concerns, and how developers react to such security- and privacy-related reviews. In this paper, we present the first study of the relationship between end-user reviews and security- & privacy-related changes in apps. Using natural language processing on 4.5M user reviews for the top 2,583 apps in Google Play, we identified 5,527 security and privacy relevant reviews (SPR). For each app version mentioned in the SPR, we use static code analysis to extract permission-protected features mentioned in the reviews. We successfully mapped SPRs to privacy-related changes in app updates in 60.77% of all cases. Using exploratory data analysis and regression analysis we are able to show that preceding SPR are a significant factor for predicting privacy-related app updates, indicating that user reviews in fact lead to privacy improvements of apps. Our results further show that apps that adopt runtime permissions receive a significantly higher number of SPR, showing that runtime permissions put privacy-jeopardizing actions better into users’ minds. Further, we can attribute about half of all privacy-relevant app changes exclusively to third-party library code. This hints at larger problems for app developers to adhere to users’ privacy expectations and markets’ privacy regulations. Our results make a call for action to make app behavior more transparent to users in order to leverage their reviews in creating incentives for developers to adhere to security and privacy best practices, while our results call at the same time for better tools to support app developers in this endeavor.
应用程序市场简化了最终用户查找和安装应用程序的任务。它们还以应用评论的形式在应用开发者和终端用户之间形成即时沟通渠道,允许用户向开发者提供有关应用的反馈。然而,目前尚不清楚用户在多大程度上利用这个渠道指出他们对应用程序的安全和隐私问题,用户对应用程序的哪些方面表示担忧,以及开发人员对这些与安全和隐私相关的评论有何反应。在本文中,我们提出了最终用户评论与应用程序中安全和隐私相关变化之间关系的第一个研究。通过自然语言处理Google Play中排名前2583的450万用户评论,我们确定了5527条安全和隐私相关评论(SPR)。对于SPR中提到的每个应用版本,我们使用静态代码分析来提取评论中提到的权限保护功能。在60.77%的案例中,我们成功地将SPRs映射到应用更新中与隐私相关的变化。通过探索性数据分析和回归分析,我们能够表明,之前的SPR是预测隐私相关应用更新的重要因素,这表明用户评论实际上导致了应用的隐私改进。我们的研究结果进一步表明,采用运行时权限的应用程序获得了更高数量的SPR,这表明运行时权限更能让用户意识到隐私危害行为。此外,我们可以将大约一半与隐私相关的应用程序更改专门归因于第三方库代码。这暗示了应用程序开发者在遵守用户隐私期望和市场隐私法规方面面临的更大问题。我们的研究结果呼吁采取行动,让应用程序的行为对用户更加透明,以便利用他们的评论来激励开发者坚持安全和隐私的最佳实践,同时我们的研究结果呼吁开发更好的工具来支持应用程序开发者在这方面的努力。
{"title":"Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy","authors":"Duc Cuong Nguyen, Erik Derr, M. Backes, Sven Bugiel","doi":"10.1109/SP.2019.00012","DOIUrl":"https://doi.org/10.1109/SP.2019.00012","url":null,"abstract":"Application markets streamline the end-users’ task of finding and installing applications. They also form an immediate communication channel between app developers and their end-users in form of app reviews, which allow users to provide developers feedback on their apps. However, it is unclear to which extent users employ this channel to point out their security and privacy concerns about apps, about which aspects of apps users express concerns, and how developers react to such security- and privacy-related reviews. In this paper, we present the first study of the relationship between end-user reviews and security- & privacy-related changes in apps. Using natural language processing on 4.5M user reviews for the top 2,583 apps in Google Play, we identified 5,527 security and privacy relevant reviews (SPR). For each app version mentioned in the SPR, we use static code analysis to extract permission-protected features mentioned in the reviews. We successfully mapped SPRs to privacy-related changes in app updates in 60.77% of all cases. Using exploratory data analysis and regression analysis we are able to show that preceding SPR are a significant factor for predicting privacy-related app updates, indicating that user reviews in fact lead to privacy improvements of apps. Our results further show that apps that adopt runtime permissions receive a significantly higher number of SPR, showing that runtime permissions put privacy-jeopardizing actions better into users’ minds. Further, we can attribute about half of all privacy-relevant app changes exclusively to third-party library code. This hints at larger problems for app developers to adhere to users’ privacy expectations and markets’ privacy regulations. Our results make a call for action to make app behavior more transparent to users in order to leverage their reviews in creating incentives for developers to adhere to security and privacy best practices, while our results call at the same time for better tools to support app developers in this endeavor.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Razzer: Finding Kernel Race Bugs through Fuzzing Razzer:通过模糊测试发现内核竞赛bug
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00017
Dae R. Jeong, Kyungtae Kim, B. Shivakumar, Byoungyoung Lee, I. Shin
A data race in a kernel is an important class of bugs, critically impacting the reliability and security of the associated system. As a result of a race, the kernel may become unresponsive. Even worse, an attacker may launch a privilege escalation attack to acquire root privileges. In this paper, we propose Razzer, a tool to find race bugs in kernels. The core of Razzer is in guiding fuzz testing towards potential data race spots in the kernel. Razzer employs two techniques to find races efficiently: a static analysis and a deterministic thread interleaving technique. Using a static analysis, Razzer identifies over-approximated potential data race spots, guiding the fuzzer to search for data races in the kernel more efficiently. Using the deterministic thread interleaving technique implemented at the hypervisor, Razzer tames the non-deterministic behavior of the kernel such that it can deterministically trigger a race. We implemented a prototype of Razzer and ran the latest Linux kernel (from v4.16-rc3 to v4.18-rc3) using Razzer. As a result, Razzer discovered 30 new races in the kernel, with 16 subsequently confirmed and accordingly patched by kernel developers after they were reported.
内核中的数据争用是一类重要的bug,严重影响相关系统的可靠性和安全性。由于竞争,内核可能变得无响应。更糟糕的是,攻击者可能发起特权升级攻击以获取根特权。在本文中,我们提出Razzer,一个在内核中查找种族错误的工具。Razzer的核心是引导模糊测试指向内核中潜在的数据竞争点。Razzer采用两种技术来有效地查找竞赛:静态分析和确定性线程交错技术。使用静态分析,Razzer识别过度近似的潜在数据竞争点,指导fuzzer更有效地在内核中搜索数据竞争。使用在管理程序中实现的确定性线程交错技术,Razzer控制内核的非确定性行为,从而可以确定地触发竞争。我们实现了Razzer的原型,并使用Razzer运行了最新的Linux内核(从v4.16-rc3到v4.18-rc3)。结果,Razzer在内核中发现了30个新的赛跑,其中16个在报告后被内核开发人员确认并相应地修补。
{"title":"Razzer: Finding Kernel Race Bugs through Fuzzing","authors":"Dae R. Jeong, Kyungtae Kim, B. Shivakumar, Byoungyoung Lee, I. Shin","doi":"10.1109/SP.2019.00017","DOIUrl":"https://doi.org/10.1109/SP.2019.00017","url":null,"abstract":"A data race in a kernel is an important class of bugs, critically impacting the reliability and security of the associated system. As a result of a race, the kernel may become unresponsive. Even worse, an attacker may launch a privilege escalation attack to acquire root privileges. In this paper, we propose Razzer, a tool to find race bugs in kernels. The core of Razzer is in guiding fuzz testing towards potential data race spots in the kernel. Razzer employs two techniques to find races efficiently: a static analysis and a deterministic thread interleaving technique. Using a static analysis, Razzer identifies over-approximated potential data race spots, guiding the fuzzer to search for data races in the kernel more efficiently. Using the deterministic thread interleaving technique implemented at the hypervisor, Razzer tames the non-deterministic behavior of the kernel such that it can deterministically trigger a race. We implemented a prototype of Razzer and ran the latest Linux kernel (from v4.16-rc3 to v4.18-rc3) using Razzer. As a result, Razzer discovered 30 new races in the kernel, with 16 subsequently confirmed and accordingly patched by kernel developers after they were reported.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129931521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 126
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake Ouroboros Crypsinous:隐私保护权益证明
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00063
Thomas Kerber, Markulf Kohlweiss, A. Kiayias, Vassilis Zikas
We present Ouroboros Crypsinous, the first formally analyzed privacy-preserving proof-of-stake blockchain protocol. To model its security we give a thorough treatment of private ledgers in the (G)UC setting that might be of independent interest. To prove our protocol secure against adaptive attacks, we introduce a new coin evolution technique relying on SNARKs and key-private forward secure encryption. The latter primitive—and the associated construction—can be of independent interest. We stress that existing approaches to private blockchain, such as the proof-of-work-based Zerocash are analyzed only against static corruptions.
我们提出了Ouroboros Crypsinous,这是第一个正式分析的保护隐私的权益证明区块链协议。为了对其安全性进行建模,我们对(G)UC设置中的私人分类账进行了彻底的处理,这可能具有独立的利益。为了证明我们的协议对自适应攻击是安全的,我们引入了一种新的依赖于snark和密钥私有前向安全加密的硬币进化技术。后一种原语——以及相关的构造——可能具有独立的意义。我们强调,现有的私有区块链方法,如基于工作量证明的零现金,仅针对静态腐败进行分析。
{"title":"Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake","authors":"Thomas Kerber, Markulf Kohlweiss, A. Kiayias, Vassilis Zikas","doi":"10.1109/SP.2019.00063","DOIUrl":"https://doi.org/10.1109/SP.2019.00063","url":null,"abstract":"We present Ouroboros Crypsinous, the first formally analyzed privacy-preserving proof-of-stake blockchain protocol. To model its security we give a thorough treatment of private ledgers in the (G)UC setting that might be of independent interest. To prove our protocol secure against adaptive attacks, we introduce a new coin evolution technique relying on SNARKs and key-private forward secure encryption. The latter primitive—and the associated construction—can be of independent interest. We stress that existing approaches to private blockchain, such as the proof-of-work-based Zerocash are analyzed only against static corruptions.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model DEEPSEC:深度学习模型安全分析统一平台
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00023
Xiang Ling, S. Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li, Ting Wang
Deep learning (DL) models are inherently vulnerable to adversarial examples – maliciously crafted inputs to trigger target DL models to misbehave – which significantly hinders the application of DL in security-sensitive domains. Intensive research on adversarial learning has led to an arms race between adversaries and defenders. Such plethora of emerging attacks and defenses raise many questions: Which attacks are more evasive, preprocessing-proof, or transferable? Which defenses are more effective, utility-preserving, or general? Are ensembles of multiple defenses more robust than individuals? Yet, due to the lack of platforms for comprehensive evaluation on adversarial attacks and defenses, these critical questions remain largely unsolved. In this paper, we present the design, implementation, and evaluation of DEEPSEC, a uniform platform that aims to bridge this gap. In its current implementation, DEEPSEC incorporates 16 state-of-the-art attacks with 10 attack utility metrics, and 13 state-of-the-art defenses with 5 defensive utility metrics. To our best knowledge, DEEPSEC is the first platform that enables researchers and practitioners to (i) measure the vulnerability of DL models, (ii) evaluate the effectiveness of various attacks/defenses, and (iii) conduct comparative studies on attacks/defenses in a comprehensive and informative manner. Leveraging DEEPSEC, we systematically evaluate the existing adversarial attack and defense methods, and draw a set of key findings, which demonstrate DEEPSEC’s rich functionality, such as (1) the trade-off between misclassification and imperceptibility is empirically confirmed; (2) most defenses that claim to be universally applicable can only defend against limited types of attacks under restricted settings; (3) it is not necessary that adversarial examples with higher perturbation magnitude are easier to be detected; (4) the ensemble of multiple defenses cannot improve the overall defense capability, but can improve the lower bound of the defense effectiveness of individuals. Extensive analysis on DEEPSEC demonstrates its capabilities and advantages as a benchmark platform which can benefit future adversarial learning research.
深度学习(DL)模型天生就容易受到对抗性示例的攻击——恶意制作的输入会触发目标DL模型行为不当——这极大地阻碍了DL在安全敏感领域的应用。对抗性学习的深入研究导致了对手和防御者之间的军备竞赛。如此多的新出现的攻击和防御引发了许多问题:哪种攻击更具规避性、预处理证明性或可转移性?哪一种防御更有效,保持效用,还是一般?多重防御的组合是否比个体更强大?然而,由于缺乏对抗性攻击和防御的综合评估平台,这些关键问题在很大程度上仍未得到解决。在本文中,我们介绍了DEEPSEC的设计、实现和评估,这是一个旨在弥合这一差距的统一平台。在目前的实施中,DEEPSEC结合了16种最先进的攻击和10种攻击效用指标,以及13种最先进的防御和5种防御效用指标。据我们所知,DEEPSEC是第一个使研究人员和从业者能够(i)测量深度学习模型的脆弱性,(ii)评估各种攻击/防御的有效性,以及(iii)以全面和翔实的方式对攻击/防御进行比较研究的平台。利用DEEPSEC,我们系统地评估了现有的对抗性攻击和防御方法,并得出了一组关键发现,这些发现证明了DEEPSEC的丰富功能,例如:(1)错误分类和不可感知之间的权衡得到了经验证实;(2)大多数声称普遍适用的防御措施只能在有限的环境下防御有限类型的攻击;(3)扰动幅度较大的对抗样例不一定更容易被检测到;(4)多个防御的集合不能提高整体防御能力,但可以提高个体防御效能的下限。对DEEPSEC的广泛分析证明了其作为基准平台的能力和优势,可以有利于未来的对抗性学习研究。
{"title":"DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model","authors":"Xiang Ling, S. Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li, Ting Wang","doi":"10.1109/SP.2019.00023","DOIUrl":"https://doi.org/10.1109/SP.2019.00023","url":null,"abstract":"Deep learning (DL) models are inherently vulnerable to adversarial examples – maliciously crafted inputs to trigger target DL models to misbehave – which significantly hinders the application of DL in security-sensitive domains. Intensive research on adversarial learning has led to an arms race between adversaries and defenders. Such plethora of emerging attacks and defenses raise many questions: Which attacks are more evasive, preprocessing-proof, or transferable? Which defenses are more effective, utility-preserving, or general? Are ensembles of multiple defenses more robust than individuals? Yet, due to the lack of platforms for comprehensive evaluation on adversarial attacks and defenses, these critical questions remain largely unsolved. In this paper, we present the design, implementation, and evaluation of DEEPSEC, a uniform platform that aims to bridge this gap. In its current implementation, DEEPSEC incorporates 16 state-of-the-art attacks with 10 attack utility metrics, and 13 state-of-the-art defenses with 5 defensive utility metrics. To our best knowledge, DEEPSEC is the first platform that enables researchers and practitioners to (i) measure the vulnerability of DL models, (ii) evaluate the effectiveness of various attacks/defenses, and (iii) conduct comparative studies on attacks/defenses in a comprehensive and informative manner. Leveraging DEEPSEC, we systematically evaluate the existing adversarial attack and defense methods, and draw a set of key findings, which demonstrate DEEPSEC’s rich functionality, such as (1) the trade-off between misclassification and imperceptibility is empirically confirmed; (2) most defenses that claim to be universally applicable can only defend against limited types of attacks under restricted settings; (3) it is not necessary that adversarial examples with higher perturbation magnitude are easier to be detected; (4) the ensemble of multiple defenses cannot improve the overall defense capability, but can improve the lower bound of the defense effectiveness of individuals. Extensive analysis on DEEPSEC demonstrates its capabilities and advantages as a benchmark platform which can benefit future adversarial learning research.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126956032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion 隐形色情:了解真实世界的敌对图像的非法在线推广
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00032
Kan Yuan, Di Tang, Xiaojing Liao, Xiaofeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang
Recent years have witnessed the rapid progress in deep learning (DP), which also brings their potential weaknesses to the spotlights of security and machine learning studies. With important discoveries made by adversarial learning research, surprisingly little attention, however, has been paid to the real-world adversarial techniques deployed by the cybercriminal to evade image-based detection. Unlike the adversarial examples that induce misclassification using nearly imperceivable perturbation, real-world adversarial images tend to be less optimal yet equally effective. As a first step to understand the threat, we report in the paper a study on adversarial promotional porn images (APPIs) that are extensively used in underground advertising. We show that the adversary today’s strategically constructs the APPIs to evade explicit content detection while still preserving their sexual appeal, even though the distortions and noise introduced are clearly observable to humans. To understand such real-world adversarial images and the underground business behind them, we develop a novel DP-based methodology called Male`na, which focuses on the regions of an image where sexual content is least obfuscated and therefore visible to the target audience of a promotion. Using this technique, we have discovered over 4,000 APPIs from 4,042,690 images crawled from popular social media, and further brought to light the unique techniques they use to evade popular explicit content detectors (e.g., Google Cloud Vision API, Yahoo Open NSFW model), and the reason that these techniques work. Also studied are the ecosystem of such illicit promotions, including the obfuscated contacts advertised through those images, compromised accounts used to disseminate them, and large APPI campaigns involving thousands of images. Another interesting finding is the apparent attempt made by cybercriminals to steal others’ images for their advertising. The study highlights the importance of the research on real-world adversarial learning and makes the first step towards mitigating the threats it poses.
近年来,深度学习(DP)的快速发展也使其潜在的弱点成为安全和机器学习研究的焦点。随着对抗性学习研究的重要发现,令人惊讶的是,人们很少关注现实世界中网络犯罪分子为逃避基于图像的检测而使用的对抗性技术。与使用几乎无法察觉的扰动诱导错误分类的对抗性示例不同,现实世界的对抗性图像往往不太理想,但同样有效。作为了解威胁的第一步,我们在论文中报告了一项对广泛用于地下广告的对抗性促销色情图像(APPIs)的研究。我们表明,今天的对手战略性地构建api以逃避明确的内容检测,同时仍然保持其性吸引力,即使引入的扭曲和噪音对人类来说是清晰可见的。为了理解这种真实世界的敌对图像及其背后的地下商业,我们开发了一种新颖的基于dp的方法,称为Male 'na,它专注于图像中性内容最不模糊的区域,因此对促销的目标受众来说是可见的。使用这种技术,我们从流行的社交媒体上抓取的4,042,690张图片中发现了4,000多个应用程序,并进一步揭示了他们用来逃避流行的显式内容检测器的独特技术(例如,Google Cloud Vision API, Yahoo Open NSFW模型),以及这些技术工作的原因。还研究了此类非法促销活动的生态系统,包括通过这些图片宣传的混淆联系人,用于传播这些图片的受损帐户,以及涉及数千张图片的大型APPI活动。另一个有趣的发现是,网络犯罪分子明显试图窃取他人的图像用于他们的广告。该研究强调了现实世界对抗性学习研究的重要性,并为减轻其构成的威胁迈出了第一步。
{"title":"Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion","authors":"Kan Yuan, Di Tang, Xiaojing Liao, Xiaofeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang","doi":"10.1109/SP.2019.00032","DOIUrl":"https://doi.org/10.1109/SP.2019.00032","url":null,"abstract":"Recent years have witnessed the rapid progress in deep learning (DP), which also brings their potential weaknesses to the spotlights of security and machine learning studies. With important discoveries made by adversarial learning research, surprisingly little attention, however, has been paid to the real-world adversarial techniques deployed by the cybercriminal to evade image-based detection. Unlike the adversarial examples that induce misclassification using nearly imperceivable perturbation, real-world adversarial images tend to be less optimal yet equally effective. As a first step to understand the threat, we report in the paper a study on adversarial promotional porn images (APPIs) that are extensively used in underground advertising. We show that the adversary today’s strategically constructs the APPIs to evade explicit content detection while still preserving their sexual appeal, even though the distortions and noise introduced are clearly observable to humans. To understand such real-world adversarial images and the underground business behind them, we develop a novel DP-based methodology called Male`na, which focuses on the regions of an image where sexual content is least obfuscated and therefore visible to the target audience of a promotion. Using this technique, we have discovered over 4,000 APPIs from 4,042,690 images crawled from popular social media, and further brought to light the unique techniques they use to evade popular explicit content detectors (e.g., Google Cloud Vision API, Yahoo Open NSFW model), and the reason that these techniques work. Also studied are the ecosystem of such illicit promotions, including the obfuscated contacts advertised through those images, compromised accounts used to disseminate them, and large APPI campaigns involving thousands of images. Another interesting finding is the apparent attempt made by cybercriminals to steal others’ images for their advertising. The study highlights the importance of the research on real-world adversarial learning and makes the first step towards mitigating the threats it poses.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case 基于ECDSA假设的阈值ECDSA:多方案例
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00024
Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat
Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among n parties, of which any subset of size t must interact in order to compute a signature. Among the resulting works to date, that of Doerner et al. requires the most natural assumptions while also achieving the best practical signing speed. It is, however, limited to the setting in which the threshold is two. We propose an extension of their scheme to arbitrary thresholds, and prove it secure against a malicious adversary corrupting up to one party less than the threshold under only the Computational Diffie-Hellman assumption in the Random Oracle model, an assumption strictly weaker than those under which ECDSA is proven. Whereas the best current schemes for threshold-two ECDSA signing use a Diffie-Hellman Key Exchange to calculate each signature's nonce, a direct adaptation of this technique to a larger threshold t would incur a round count linear in t; thus we abandon it in favor of a new mechanism that yields a protocol requiring log(t)+6 rounds in total. We design a new consistency check, similar in spirit to that of Doerner et al., but suitable for an arbitrary number of participants, and we optimize the underlying two-party multiplication protocol on which our scheme is based, reducing its concrete communication and computation costs. We implement our scheme and evaluate it among groups of up to 256 of co-located and 128 geographically-distributed parties, and among small groups of embedded devices. We find that in the LAN setting, our scheme outperforms all prior works by orders of magnitude, and that it is efficient enough for use even on smartphones or hardware tokens. In the WAN setting we find that, despite its logarithmic round count, our protocol outperforms the best constant-round protocols in realistic scenarios.
加密货币应用程序刺激了人们对使用阈值协议计算ECDSA签名的兴趣的复苏——也就是说,签名密钥在n方之间秘密共享的协议,其中任何大小为t的子集都必须交互才能计算签名。在迄今为止的成果中,Doerner等人的工作需要最自然的假设,同时也达到了最佳的实际签名速度。然而,它仅限于阈值为2的设置。我们将他们的方案扩展到任意阈值,并证明它在随机Oracle模型中的计算Diffie-Hellman假设下是安全的,可以防止恶意对手破坏到小于阈值的一方,该假设严格弱于证明ECDSA的假设。尽管当前最佳的阈值- 2 ECDSA签名方案使用Diffie-Hellman密钥交换来计算每个签名的随机数,但将该技术直接应用于更大的阈值t将导致整数计数在t中呈线性;因此,我们放弃了它,转而采用一种新的机制,该机制产生的协议总共需要log(t)+6轮。我们设计了一个新的一致性检查,类似于Doerner等人的精神,但适用于任意数量的参与者,我们优化了我们方案所基于的底层双方乘法协议,降低了其具体的通信和计算成本。我们实现了我们的方案,并在多达256个共址和128个地理分布方的组中以及在小型嵌入式设备组中对其进行了评估。我们发现,在局域网设置中,我们的方案在数量级上优于所有先前的工作,并且即使在智能手机或硬件令牌上使用它也足够有效。在广域网设置中,我们发现,尽管其对数轮询计数,但我们的协议在实际场景中优于最佳的恒轮询协议。
{"title":"Threshold ECDSA from ECDSA Assumptions: The Multiparty Case","authors":"Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat","doi":"10.1109/SP.2019.00024","DOIUrl":"https://doi.org/10.1109/SP.2019.00024","url":null,"abstract":"Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among n parties, of which any subset of size t must interact in order to compute a signature. Among the resulting works to date, that of Doerner et al. requires the most natural assumptions while also achieving the best practical signing speed. It is, however, limited to the setting in which the threshold is two. We propose an extension of their scheme to arbitrary thresholds, and prove it secure against a malicious adversary corrupting up to one party less than the threshold under only the Computational Diffie-Hellman assumption in the Random Oracle model, an assumption strictly weaker than those under which ECDSA is proven. Whereas the best current schemes for threshold-two ECDSA signing use a Diffie-Hellman Key Exchange to calculate each signature's nonce, a direct adaptation of this technique to a larger threshold t would incur a round count linear in t; thus we abandon it in favor of a new mechanism that yields a protocol requiring log(t)+6 rounds in total. We design a new consistency check, similar in spirit to that of Doerner et al., but suitable for an arbitrary number of participants, and we optimize the underlying two-party multiplication protocol on which our scheme is based, reducing its concrete communication and computation costs. We implement our scheme and evaluate it among groups of up to 256 of co-located and 128 geographically-distributed parties, and among small groups of embedded devices. We find that in the LAN setting, our scheme outperforms all prior works by orders of magnitude, and that it is efficient enough for use even on smartphones or hardware tokens. In the WAN setting we find that, despite its logarithmic round count, our protocol outperforms the best constant-round protocols in realistic scenarios.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Breaking LTE on Layer Two 在第二层破坏LTE
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00006
David Rupprecht, K. Kohls, Thorsten Holz, C. Pöpper
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal role in our information society: LTE combines performance goals with modern security mechanisms and serves casual use cases as well as critical infrastructure and public safety communications. Both scenarios are demanding towards a resilient and secure specification and implementation of LTE, as outages and open attack vectors potentially lead to severe risks. Previous work on LTE protocol security identified crucial attack vectors for both the physical (layer one) and network (layer three) layers. Data link layer (layer two) protocols, however, remain a blind spot in existing LTE security research. In this paper, we present a comprehensive layer two security analysis and identify three attack vectors. These attacks impair the confidentiality and/or privacy of LTE communication. More specifically, we first present a passive identity mapping attack that matches volatile radio identities to longer lasting network identities, enabling us to identify users within a cell and serving as a stepping stone for follow-up attacks. Second, we demonstrate how a passive attacker can abuse the resource allocation as a side channel to perform website fingerprinting that enables the attacker to learn the websites a user accessed. Finally, we present the A LTE R attack that exploits the fact that LTE user data is encrypted in counter mode (AES-CTR) but not integrity protected, which allows us to modify the message payload. As a proof-of-concept demonstration, we show how an active attacker can redirect DNS requests and then perform a DNS spoofing attack. As a result, the user is redirected to a malicious website. Our experimental analysis demonstrates the real-world applicability of all three attacks and emphasizes the threat of open attack vectors on LTE layer two protocols.
长期演进(LTE)是最新的移动通信标准,在我们的信息社会中发挥着关键作用:LTE将性能目标与现代安全机制相结合,服务于临时用例以及关键基础设施和公共安全通信。这两种情况都需要弹性和安全的LTE规范和实现,因为中断和开放的攻击向量可能导致严重的风险。先前关于LTE协议安全的工作确定了物理层(第一层)和网络层(第三层)的关键攻击向量。然而,数据链路层(第二层)协议在现有的LTE安全研究中仍然是一个盲点。在本文中,我们提出了一个全面的第二层安全分析,并确定了三种攻击向量。这些攻击损害了LTE通信的机密性和/或隐私性。更具体地说,我们首先提出了一种被动身份映射攻击,将不稳定的无线电身份与更持久的网络身份相匹配,使我们能够识别小区内的用户,并作为后续攻击的垫脚石。其次,我们展示了被动攻击者如何滥用资源分配作为执行网站指纹的侧通道,使攻击者能够了解用户访问的网站。最后,我们提出了一种LTE R攻击,它利用了LTE用户数据以计数器模式(AES-CTR)加密但不受完整性保护的事实,这允许我们修改消息有效负载。作为概念验证演示,我们将展示活动攻击者如何重定向DNS请求,然后执行DNS欺骗攻击。结果,用户被重定向到一个恶意网站。我们的实验分析证明了这三种攻击在现实世界中的适用性,并强调了LTE第二层协议上开放攻击向量的威胁。
{"title":"Breaking LTE on Layer Two","authors":"David Rupprecht, K. Kohls, Thorsten Holz, C. Pöpper","doi":"10.1109/SP.2019.00006","DOIUrl":"https://doi.org/10.1109/SP.2019.00006","url":null,"abstract":"Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal role in our information society: LTE combines performance goals with modern security mechanisms and serves casual use cases as well as critical infrastructure and public safety communications. Both scenarios are demanding towards a resilient and secure specification and implementation of LTE, as outages and open attack vectors potentially lead to severe risks. Previous work on LTE protocol security identified crucial attack vectors for both the physical (layer one) and network (layer three) layers. Data link layer (layer two) protocols, however, remain a blind spot in existing LTE security research. In this paper, we present a comprehensive layer two security analysis and identify three attack vectors. These attacks impair the confidentiality and/or privacy of LTE communication. More specifically, we first present a passive identity mapping attack that matches volatile radio identities to longer lasting network identities, enabling us to identify users within a cell and serving as a stepping stone for follow-up attacks. Second, we demonstrate how a passive attacker can abuse the resource allocation as a side channel to perform website fingerprinting that enables the attacker to learn the websites a user accessed. Finally, we present the A LTE R attack that exploits the fact that LTE user data is encrypted in counter mode (AES-CTR) but not integrity protected, which allows us to modify the message payload. As a proof-of-concept demonstration, we show how an active attacker can redirect DNS requests and then perform a DNS spoofing attack. As a result, the user is redirected to a malicious website. Our experimental analysis demonstrates the real-world applicability of all three attacks and emphasizes the threat of open attack vectors on LTE layer two protocols.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"605 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 136
期刊
2019 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1