首页 > 最新文献

Proceedings of the 7th ACM Workshop on Moving Target Defense最新文献

英文 中文
Static Analysis Opportunities for Improving Agile and Moving Target Defenses 改进敏捷和移动目标防御的静态分析机会
Pub Date : 2020-11-09 DOI: 10.1145/3411496.3421230
T. Jaeger
Agile defenses have been proposed to enable systems to change their defensive posture dynamically to thwart attacks. Researchers have suggested a variety of agile defenses that leverage renaming (e.g., for network services), migration (e.g., for cloud instances), variation (e.g., for application configurations), and patching (e.g., for programs), among others. These agile defenses demonstrate promise for achieving a key goal: increasing the cost of launching a successful attack. However, agile defenses also incur non-trivial costs in overhead and/or complexity to defenders as well, leaving defenders hesitant to employ such defenses without further justification for their necessity. A question we examine in this keynote is how to develop techniques that may aid defenders in choosing when to employ agile defenses and which agile defenses to employ.
敏捷防御已被提出,使系统能够动态地改变其防御姿态以阻止攻击。研究人员提出了多种敏捷防御方法,包括重命名(例如,针对网络服务)、迁移(例如,针对云实例)、变化(例如,针对应用程序配置)和修补(例如,针对程序)等。这些灵活的防御表明了实现关键目标的希望:增加成功发起攻击的成本。然而,敏捷防御也会给防御者带来开销和/或复杂性方面的巨大成本,使防御者在没有进一步证明其必要性的情况下犹豫是否采用这种防御。我们在本次主题演讲中研究的一个问题是,如何开发技术来帮助防御者选择何时采用敏捷防御以及采用哪种敏捷防御。
{"title":"Static Analysis Opportunities for Improving Agile and Moving Target Defenses","authors":"T. Jaeger","doi":"10.1145/3411496.3421230","DOIUrl":"https://doi.org/10.1145/3411496.3421230","url":null,"abstract":"Agile defenses have been proposed to enable systems to change their defensive posture dynamically to thwart attacks. Researchers have suggested a variety of agile defenses that leverage renaming (e.g., for network services), migration (e.g., for cloud instances), variation (e.g., for application configurations), and patching (e.g., for programs), among others. These agile defenses demonstrate promise for achieving a key goal: increasing the cost of launching a successful attack. However, agile defenses also incur non-trivial costs in overhead and/or complexity to defenders as well, leaving defenders hesitant to employ such defenses without further justification for their necessity. A question we examine in this keynote is how to develop techniques that may aid defenders in choosing when to employ agile defenses and which agile defenses to employ.","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"450 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122487156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cybersecurity Dynamics Way of Thinking and Landscape 网络安全动态的思维方式与景观
Pub Date : 2020-11-09 DOI: 10.1145/3411496.3421225
Shouhuai Xu
The Cybersecurity Dynamics framework offers an approach to systematically understanding, characterizing, quantifying and managing cybersecurity from a holistic perspective. The framework looks into cyberspace through the dynamics lens because environments in cyberspace often evolve with time (e.g., software vulnerabilities, attack capabilities, defense capabilities, and cybersecurity states). The dynamics lens offers a unique viewpoint, which guides the modeling of the various situations which evolve with respect to cybersecurity. This type of evolution is driven by attackers, defenders, and users of related systems and is manifested by their attack/defense/use activities. Since its inception in 2014, there has been significant progress in characterizing and taming various kinds of cybersecurity dynamics. In this paper we discuss the landscape and way-of-thinking that guide the Cybersecurity Dynamics model, including two killer applications and the technical barriers that serve as outstanding open problems for future research.
网络安全动力学框架提供了一种从整体角度系统地理解、表征、量化和管理网络安全的方法。该框架通过动态视角观察网络空间,因为网络空间中的环境经常随着时间的推移而演变(例如,软件漏洞、攻击能力、防御能力和网络安全状态)。动态镜头提供了一个独特的观点,它指导了与网络安全相关的各种情况的建模。这种类型的进化由攻击者、防御者和相关系统的用户驱动,并通过他们的攻击/防御/使用活动表现出来。自2014年成立以来,在描述和驯服各种网络安全动态方面取得了重大进展。在本文中,我们讨论了指导网络安全动力学模型的景观和思维方式,包括两个杀手级应用和作为未来研究突出开放问题的技术障碍。
{"title":"The Cybersecurity Dynamics Way of Thinking and Landscape","authors":"Shouhuai Xu","doi":"10.1145/3411496.3421225","DOIUrl":"https://doi.org/10.1145/3411496.3421225","url":null,"abstract":"The Cybersecurity Dynamics framework offers an approach to systematically understanding, characterizing, quantifying and managing cybersecurity from a holistic perspective. The framework looks into cyberspace through the dynamics lens because environments in cyberspace often evolve with time (e.g., software vulnerabilities, attack capabilities, defense capabilities, and cybersecurity states). The dynamics lens offers a unique viewpoint, which guides the modeling of the various situations which evolve with respect to cybersecurity. This type of evolution is driven by attackers, defenders, and users of related systems and is manifested by their attack/defense/use activities. Since its inception in 2014, there has been significant progress in characterizing and taming various kinds of cybersecurity dynamics. In this paper we discuss the landscape and way-of-thinking that guide the Cybersecurity Dynamics model, including two killer applications and the technical barriers that serve as outstanding open problems for future research.","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Session details: Keynote 1 会议详情:主题演讲1
Pub Date : 2020-11-09 DOI: 10.1145/3433231
Hamed Okhravi
{"title":"Session details: Keynote 1","authors":"Hamed Okhravi","doi":"10.1145/3433231","DOIUrl":"https://doi.org/10.1145/3433231","url":null,"abstract":"","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116389471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems 实时安全和关键任务系统中的移动目标防御考虑
Pub Date : 2020-11-09 DOI: 10.1145/3411496.3421224
N. Burow, Ryan Burrow, R. Khazan, H. Shrobe, Bryan C. Ward
Moving-target defenses (MTDs) have been widely studied for common general-purpose and enterprise-computing applications. Indeed, such work has produced highly effective, low-overhead defenses that are now commonly deployed in many systems today. One application space that has seen comparatively little focus is that of safety- and mission-critical systems, which are often real-time systems (RTS) with temporal requirements. Furthermore, such systems are increasingly being targeted by attackers, such as in industrial control systems (ICS), including power grids. The strict timing requirements of these systems presents a different design objective than is common in general-purpose applications -- systems should be designed around the worst-case performance, rather than the average case. Perhaps in part due to these alternative design considerations, many real-time systems have not benefited from much of the work on software security that common general-purpose and enterprise applications have, despite the ubiquity of real-time systems that actively control so many applications we as a society have come to rely on, from power generation and distribution, to automotive and avionic applications, and many others. This paper explores the application of moving-target defenses in the context of real-time systems. In particular, the worst-case performance of several address-space randomization defenses are evaluated to study the implications of such designs in real-time applications. These results suggest that current moving-target defenses, while performant in the average case, can exhibit significant tail latencies, which can be problematic in real-time applications, especially if such overheads are not considered in the design and analysis of the system. These results inform future research directions for moving-target defenses in real-time applications.
移动目标防御(MTDs)在通用计算和企业计算应用中得到了广泛的研究。事实上,这样的工作已经产生了高效、低开销的防御,现在在许多系统中普遍部署。相对较少关注的一个应用程序领域是安全和任务关键型系统,这些系统通常是具有时间需求的实时系统(RTS)。此外,这些系统越来越多地成为攻击者的目标,例如工业控制系统(ICS),包括电网。这些系统严格的时序要求呈现出与通用应用程序不同的设计目标——系统应该围绕最坏情况而不是平均情况进行设计。也许部分是由于这些可选的设计考虑,尽管实时系统无处不在,主动控制着我们作为一个社会所依赖的许多应用程序,从发电和配电,到汽车和航空电子应用程序,以及许多其他应用程序,但许多实时系统并没有从通用和企业应用程序所拥有的软件安全工作中获益。本文探讨了移动目标防御在实时系统中的应用。特别是,评估了几种地址空间随机化防御的最坏情况性能,以研究此类设计在实时应用中的含义。这些结果表明,当前的移动目标防御虽然在平均情况下性能良好,但可能表现出显著的尾部延迟,这在实时应用中可能会出现问题,特别是如果在系统的设计和分析中没有考虑到这些开销。这些结果为移动目标防御的实时应用指明了未来的研究方向。
{"title":"Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems","authors":"N. Burow, Ryan Burrow, R. Khazan, H. Shrobe, Bryan C. Ward","doi":"10.1145/3411496.3421224","DOIUrl":"https://doi.org/10.1145/3411496.3421224","url":null,"abstract":"Moving-target defenses (MTDs) have been widely studied for common general-purpose and enterprise-computing applications. Indeed, such work has produced highly effective, low-overhead defenses that are now commonly deployed in many systems today. One application space that has seen comparatively little focus is that of safety- and mission-critical systems, which are often real-time systems (RTS) with temporal requirements. Furthermore, such systems are increasingly being targeted by attackers, such as in industrial control systems (ICS), including power grids. The strict timing requirements of these systems presents a different design objective than is common in general-purpose applications -- systems should be designed around the worst-case performance, rather than the average case. Perhaps in part due to these alternative design considerations, many real-time systems have not benefited from much of the work on software security that common general-purpose and enterprise applications have, despite the ubiquity of real-time systems that actively control so many applications we as a society have come to rely on, from power generation and distribution, to automotive and avionic applications, and many others. This paper explores the application of moving-target defenses in the context of real-time systems. In particular, the worst-case performance of several address-space randomization defenses are evaluated to study the implications of such designs in real-time applications. These results suggest that current moving-target defenses, while performant in the average case, can exhibit significant tail latencies, which can be problematic in real-time applications, especially if such overheads are not considered in the design and analysis of the system. These results inform future research directions for moving-target defenses in real-time applications.","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116852217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic Address Validation Array (DAVA): A Moving Target Defense Protocol for CAN bus 动态地址验证阵列(DAVA):一种针对CAN总线的移动目标防御协议
Pub Date : 2020-11-09 DOI: 10.1145/3411496.3421221
R. Brown, Alex Marti, C. Jenkins, Susmit Shannigrahi
This paper presents Dynamic Address Validation Array (DAVA), a novel moving target defense protocol for the Controller Area Network Bus (CAN bus). DAVA's primary goal is to mitigate the common CAN bus vulnerability of an unauthorized entity misappropriating components in the vehicle through sniffing and reusing ECU IDs for replaying messages. Using a dynamically allocated array stored in the ECU that is updated and validated frequently, DAVA limits an attacker's ability to reuse ECU IDs for replay attacks. The protocol strives to be minimally invasive and lightweight for application in CAN bus while still being secure. This paper discusses the DAVA protocol, a proof of concept implementation, and initial performance measurements. This paper explains how DAVA is able to provide a robust security framework for CAN bus without the need for a large amount of storage or CAN bus standard modification.
动态地址验证阵列(DAVA)是一种针对控制器局域网总线(CAN)的新型移动目标防御协议。DAVA的主要目标是减轻未经授权实体通过嗅探和重用ECU id来重放消息而盗用车辆组件的常见CAN总线漏洞。使用动态分配的数组存储在ECU中,经常更新和验证,DAVA限制了攻击者重用ECU id进行重放攻击的能力。该协议力求在保证安全性的同时,在CAN总线上实现最小侵入性和轻量化。本文讨论了DAVA协议、概念验证实现和初始性能测量。本文阐述了DAVA如何能够在不需要大量存储或修改CAN总线标准的情况下为CAN总线提供健壮的安全框架。
{"title":"Dynamic Address Validation Array (DAVA): A Moving Target Defense Protocol for CAN bus","authors":"R. Brown, Alex Marti, C. Jenkins, Susmit Shannigrahi","doi":"10.1145/3411496.3421221","DOIUrl":"https://doi.org/10.1145/3411496.3421221","url":null,"abstract":"This paper presents Dynamic Address Validation Array (DAVA), a novel moving target defense protocol for the Controller Area Network Bus (CAN bus). DAVA's primary goal is to mitigate the common CAN bus vulnerability of an unauthorized entity misappropriating components in the vehicle through sniffing and reusing ECU IDs for replaying messages. Using a dynamically allocated array stored in the ECU that is updated and validated frequently, DAVA limits an attacker's ability to reuse ECU IDs for replay attacks. The protocol strives to be minimally invasive and lightweight for application in CAN bus while still being secure. This paper discusses the DAVA protocol, a proof of concept implementation, and initial performance measurements. This paper explains how DAVA is able to provide a robust security framework for CAN bus without the need for a large amount of storage or CAN bus standard modification.","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122905800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OpenMTD
Pub Date : 2020-11-09 DOI: 10.1145/3411496.3421223
Richard Poschinger, Nils Rodday, Raphael Labaca-Castro, Gabi Dreo Rodosek
Moving Target Defense (MTD) represents a way of defending networked systems on different levels. It mainly focuses on shifting the different surfaces of the protected environment. Existing approaches studied on network-level are Port Hopping (PH), which shifts ports, and Network Address Shuffling (NAS), which steadily alters the network addresses of hosts. As a result, the formerly static attack surface now behaves dynamically whilst the relationship of ports to services and network addresses to hosts can be changed. Most MTD approaches have only been evaluated theoretically and comparisons are still lacking. Hence, based on existing results, it is not possible to contrast implementations like PH and NAS in terms of security and network performance. Finally, implementation details are usually not shared publicly. To mitigate these shortcomings, we developed a hybrid platform that evaluates such techniques and reimplemented PH and NAS with additional features such as connection tracker with fingerprinting service and a honeypot module, which is helpful to bypass attackers attempts. We created a common software platform to integrate approaches using the same gateway components and providing graphic network usability. The environment, named OpenMTD, has been open-sourced and works in a modular fashion allowing for easy extensions and future developments. We show that common attacks, starting with a reconnaissance phase were not able to successfully reach vulnerable hosts that are part of the OpenMTD-protected network. A new worm has been developed to spread across the network and the propagation paths showed that OpenMTD can lay the ground for extending protection mechanisms against self-propagating threats.
{"title":"OpenMTD","authors":"Richard Poschinger, Nils Rodday, Raphael Labaca-Castro, Gabi Dreo Rodosek","doi":"10.1145/3411496.3421223","DOIUrl":"https://doi.org/10.1145/3411496.3421223","url":null,"abstract":"Moving Target Defense (MTD) represents a way of defending networked systems on different levels. It mainly focuses on shifting the different surfaces of the protected environment. Existing approaches studied on network-level are Port Hopping (PH), which shifts ports, and Network Address Shuffling (NAS), which steadily alters the network addresses of hosts. As a result, the formerly static attack surface now behaves dynamically whilst the relationship of ports to services and network addresses to hosts can be changed. Most MTD approaches have only been evaluated theoretically and comparisons are still lacking. Hence, based on existing results, it is not possible to contrast implementations like PH and NAS in terms of security and network performance. Finally, implementation details are usually not shared publicly. To mitigate these shortcomings, we developed a hybrid platform that evaluates such techniques and reimplemented PH and NAS with additional features such as connection tracker with fingerprinting service and a honeypot module, which is helpful to bypass attackers attempts. We created a common software platform to integrate approaches using the same gateway components and providing graphic network usability. The environment, named OpenMTD, has been open-sourced and works in a modular fashion allowing for easy extensions and future developments. We show that common attacks, starting with a reconnaissance phase were not able to successfully reach vulnerable hosts that are part of the OpenMTD-protected network. A new worm has been developed to spread across the network and the propagation paths showed that OpenMTD can lay the ground for extending protection mechanisms against self-propagating threats.","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Session details: Session 2: Systematization of MTD 1 会议详情:会议2:MTD系统化1
Pub Date : 2020-11-09 DOI: 10.1145/3433234
Hamed Okhravi
{"title":"Session details: Session 2: Systematization of MTD 1","authors":"Hamed Okhravi","doi":"10.1145/3433234","DOIUrl":"https://doi.org/10.1145/3433234","url":null,"abstract":"","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Range and Topology Mutation Based Wireless Agility 基于距离和拓扑突变的无线敏捷性
Pub Date : 2020-11-09 DOI: 10.1145/3411496.3421228
Qi Duan, E. Al-Shaer, Jiang Xie
Wireless is a key component in most of today's network infrastructures. Yet, it is highly susceptible to network attacks because wireless communication and infrastructure, such as Access Point(AP) and clients, can be easily discovered and targeted. Particularly,the static nature of the wireless AP topology and its configuration offers a significant advantage to adversaries to identify network targets and plan devastating attacks such as denial of service or eavesdropping. This is critically important in hostile military environment in which soldiers depend on wireless infrastructure for communication and coordination. In this paper, we present formal foundations for two wireless agility techniques: (1) Random Range Mutation (RNM) that allows for periodic changes of AP coverage range randomly, and (2) Random Topology Mutation (RTM) that allows for random motion and placement of APs in the wireless infrastructure. The goal of these techniques is to proactively defend against targeted attacks (e.g.,DoS and eavesdropping) by forcing the wireless clients to change their AP association randomly. We apply Satisfiability Modulo Theories (SMT) and Answer Set Programming (ASP) based constraint solving methods that allow for optimizing wireless AP mutation while maintaining service requirements including coverage, security and energy properties under incomplete information about the adversary strategies. Our evaluation validates the feasibility,scalability, and effectiveness of the formal methods based technical approaches.
无线是当今大多数网络基础设施的关键组成部分。然而,它很容易受到网络攻击,因为无线通信和基础设施,如接入点(AP)和客户端,很容易被发现和攻击。特别是,无线AP拓扑的静态特性及其配置为攻击者识别网络目标和计划破坏性攻击(如拒绝服务或窃听)提供了显著的优势。在士兵依赖无线基础设施进行通信和协调的敌对军事环境中,这一点至关重要。在本文中,我们提出了两种无线敏捷性技术的正式基础:(1)随机范围突变(RNM),允许AP覆盖范围随机周期性变化;(2)随机拓扑突变(RTM),允许AP在无线基础设施中随机移动和放置。这些技术的目标是通过强制无线客户端随机更改其AP关联来主动防御有针对性的攻击(例如,DoS和窃听)。我们应用可满足模理论(SMT)和基于答案集规划(ASP)的约束求解方法,允许优化无线AP突变,同时在关于对手策略的不完全信息下保持服务需求,包括覆盖范围、安全性和能量属性。我们的评估验证了基于技术方法的形式化方法的可行性、可扩展性和有效性。
{"title":"Range and Topology Mutation Based Wireless Agility","authors":"Qi Duan, E. Al-Shaer, Jiang Xie","doi":"10.1145/3411496.3421228","DOIUrl":"https://doi.org/10.1145/3411496.3421228","url":null,"abstract":"Wireless is a key component in most of today's network infrastructures. Yet, it is highly susceptible to network attacks because wireless communication and infrastructure, such as Access Point(AP) and clients, can be easily discovered and targeted. Particularly,the static nature of the wireless AP topology and its configuration offers a significant advantage to adversaries to identify network targets and plan devastating attacks such as denial of service or eavesdropping. This is critically important in hostile military environment in which soldiers depend on wireless infrastructure for communication and coordination. In this paper, we present formal foundations for two wireless agility techniques: (1) Random Range Mutation (RNM) that allows for periodic changes of AP coverage range randomly, and (2) Random Topology Mutation (RTM) that allows for random motion and placement of APs in the wireless infrastructure. The goal of these techniques is to proactively defend against targeted attacks (e.g.,DoS and eavesdropping) by forcing the wireless clients to change their AP association randomly. We apply Satisfiability Modulo Theories (SMT) and Answer Set Programming (ASP) based constraint solving methods that allow for optimizing wireless AP mutation while maintaining service requirements including coverage, security and energy properties under incomplete information about the adversary strategies. Our evaluation validates the feasibility,scalability, and effectiveness of the formal methods based technical approaches.","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"30 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123258315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Session details: Session 1: New Techniques, Models, and Evaluation 会议详情:会议1:新技术,模型和评估
Pub Date : 2020-11-09 DOI: 10.1145/3433232
Cliff X. Wang
{"title":"Session details: Session 1: New Techniques, Models, and Evaluation","authors":"Cliff X. Wang","doi":"10.1145/3433232","DOIUrl":"https://doi.org/10.1145/3433232","url":null,"abstract":"","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic 长期随机化:大流行中保护隐私的接触者追踪
Pub Date : 2020-11-09 DOI: 10.1145/3411496.3421229
T. D. Nguyen, Markus Miettinen, A. Sadeghi
Caused by coronavirus SARS-CoV-2, the COVID-19 disease spreads particularly through direct contact between people. Health authorities face the challenge of identifying and isolating infection chains to prevent the pandemic from spreading further. To improve the efficiency and effectiveness of manual contact tracing, many countries have recently introduced digital contact tracing apps running on smartphones of users for helping to identify contacts between individual users. These apps are usually based on beaconing pseudonymous identifiers over a proximity communication protocol like Bluetooth LE. The identification of potentially critical contacts is then performed by comparing the identifiers emitted by persons reported as infected and the identifiers observed by other users of the system and issuing appropriate warnings to them in case a matching identifier is found. However, by beaconing identifiers into their proximity, individual users potentially become traceable by entities that systematically collect observations in various places. To preserve privacy of users and be compliant to various privacy regulations many proposed systems use ephemeral, pseudo-random identifiers that are more difficult to link together. In this paper, we briefly analyze and discuss privacy properties of a selected number of proposed contact tracing solutions and the impact of the applied randomization approaches. We also discuss the pros and cons of these tracing schemes.
由冠状病毒SARS-CoV-2引起的COVID-19疾病主要通过人与人之间的直接接触传播。卫生当局面临着识别和隔离感染链以防止大流行进一步传播的挑战。为了提高人工接触者追踪的效率和效果,许多国家最近推出了在用户智能手机上运行的数字接触者追踪应用程序,以帮助识别个人用户之间的接触者。这些应用程序通常基于类似蓝牙LE的近距离通信协议上的信标假名标识符。然后,通过比较报告的感染者发出的标识符和系统其他用户观察到的标识符来识别潜在的关键接触者,并在发现匹配的标识符时向他们发出适当的警告。然而,通过将标识符标记到其附近,个人用户可能会被在不同地方系统地收集观察结果的实体跟踪。为了保护用户的隐私并符合各种隐私法规,许多拟议的系统使用临时的伪随机标识符,这些标识符更难连接在一起。在本文中,我们简要地分析和讨论了一些建议的接触者追踪解决方案的隐私属性以及应用随机化方法的影响。我们还讨论了这些跟踪方案的优缺点。
{"title":"Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic","authors":"T. D. Nguyen, Markus Miettinen, A. Sadeghi","doi":"10.1145/3411496.3421229","DOIUrl":"https://doi.org/10.1145/3411496.3421229","url":null,"abstract":"Caused by coronavirus SARS-CoV-2, the COVID-19 disease spreads particularly through direct contact between people. Health authorities face the challenge of identifying and isolating infection chains to prevent the pandemic from spreading further. To improve the efficiency and effectiveness of manual contact tracing, many countries have recently introduced digital contact tracing apps running on smartphones of users for helping to identify contacts between individual users. These apps are usually based on beaconing pseudonymous identifiers over a proximity communication protocol like Bluetooth LE. The identification of potentially critical contacts is then performed by comparing the identifiers emitted by persons reported as infected and the identifiers observed by other users of the system and issuing appropriate warnings to them in case a matching identifier is found. However, by beaconing identifiers into their proximity, individual users potentially become traceable by entities that systematically collect observations in various places. To preserve privacy of users and be compliant to various privacy regulations many proposed systems use ephemeral, pseudo-random identifiers that are more difficult to link together. In this paper, we briefly analyze and discuss privacy properties of a selected number of proposed contact tracing solutions and the impact of the applied randomization approaches. We also discuss the pros and cons of these tracing schemes.","PeriodicalId":288218,"journal":{"name":"Proceedings of the 7th ACM Workshop on Moving Target Defense","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 7th ACM Workshop on Moving Target Defense
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1