首页 > 最新文献

2023 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL 深度贿赂:用深度强化学习预测区块链挖矿中贿赂的兴起
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00008
R. Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar
Blockchain security relies on incentives to ensure participants, called miners, cooperate and behave as the protocol dictates. Such protocols have a security threshold – a miner whose relative computational power is larger than the threshold can deviate to improve her revenue. Moreover, blockchain participants can behave in a petty compliant manner: usually follow the protocol, but deviate to increase revenue when deviation cannot be distinguished externally from the prescribed behavior. The effect of petty compliant miners on the security threshold of blockchains is not well understood. Due to the complexity of the analysis, it remained an open question since Carlsten et al. identified it in 2016. In this work, we use deep Reinforcement Learning (RL) to analyze how a rational miner performs selfish mining by deviating from the protocol to maximize revenue when petty compliant miners are present. We find that a selfish miner can exploit petty compliant miners to increase her revenue by bribing them. Our method reveals that the security threshold is lower when petty compliant miners are present. In particular, with parameters estimated from the Bitcoin blockchain, we find the threshold drops from the known value of 25% to only 21% (or 19%) when 50% (or 75%) of the other miners are petty compliant. Hence, our deep RL analysis puts the open question to rest; the presence of petty compliant miners exacerbates a blockchain's vulnerability to selfish mining and is a major security threat.
区块链的安全性依赖于激励机制,以确保被称为矿工的参与者按照协议的规定进行合作和行为。这样的协议有一个安全阈值——相对计算能力大于这个阈值的矿工可以偏离这个阈值来提高自己的收入。此外,区块链参与者可以以一种微不足道的合规方式行事:通常遵循协议,但在无法从外部区分偏离规定行为时偏离以增加收入。小型合规矿工对区块链安全阈值的影响尚未得到很好的理解。由于分析的复杂性,自2016年Carlsten等人发现它以来,它仍然是一个悬而未决的问题。在这项工作中,我们使用深度强化学习(RL)来分析一个理性的矿工是如何通过偏离协议来实现收益最大化的。我们发现,一个自私的矿工可以通过贿赂那些顺从的小矿工来增加自己的收入。我们的方法表明,当小型合规矿工存在时,安全阈值较低。特别是,根据比特币区块链估计的参数,我们发现当50%(或75%)的其他矿工都是微不足道的合规时,阈值从已知的25%下降到21%(或19%)。因此,我们的深度强化学习分析解决了这个悬而未决的问题;小型合规矿工的存在加剧了区块链对自私采矿的脆弱性,并且是一个主要的安全威胁。
{"title":"Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL","authors":"R. Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar","doi":"10.1109/SPW59333.2023.00008","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00008","url":null,"abstract":"Blockchain security relies on incentives to ensure participants, called miners, cooperate and behave as the protocol dictates. Such protocols have a security threshold – a miner whose relative computational power is larger than the threshold can deviate to improve her revenue. Moreover, blockchain participants can behave in a petty compliant manner: usually follow the protocol, but deviate to increase revenue when deviation cannot be distinguished externally from the prescribed behavior. The effect of petty compliant miners on the security threshold of blockchains is not well understood. Due to the complexity of the analysis, it remained an open question since Carlsten et al. identified it in 2016. In this work, we use deep Reinforcement Learning (RL) to analyze how a rational miner performs selfish mining by deviating from the protocol to maximize revenue when petty compliant miners are present. We find that a selfish miner can exploit petty compliant miners to increase her revenue by bribing them. Our method reveals that the security threshold is lower when petty compliant miners are present. In particular, with parameters estimated from the Bitcoin blockchain, we find the threshold drops from the known value of 25% to only 21% (or 19%) when 50% (or 75%) of the other miners are petty compliant. Hence, our deep RL analysis puts the open question to rest; the presence of petty compliant miners exacerbates a blockchain's vulnerability to selfish mining and is a major security threat.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127810765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The ghost is the machine: Weird machines in transient execution 幽灵是机器:在瞬态执行的奇怪机器
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00029
Ping-Lun Wang, Fraser Brown, R. Wahby
Microarchitectural attacks typically exploit some form of transient execution to steal sensitive data. More recently, though, a new class of attacks has used transient execution to (covertly) compute: Wampler et al. use Spectre primitives to obfuscate control flow, and Evtyushkin et al. construct “weird” logic gates that use Intel's TSX to compute entirely using microarchitectural side effects (i.e., in a cache side channel). This paper generalizes weird gate constructions beyond TSX and shows how to build such gates using any transient execution primitive. We build logic gates using exceptions, the branch predictor, and the branch target buffer, and we design a NOT gate that appears to perform roughly one order of magnitude11The data in the original paper reports XOR execution speed and XOR executions per second that do not agree with one another. Taking the execution speed at face value, our construction is two orders of magnitude faster; instead, we calculate a faster execution speed for their reported executions per second, and our approach only yields an order of magnitude improvement. better than the prior state of the art. These constructions work on AMD, Intel, and ARM machines with ≈95-99% accuracy; a million AND gate executions take from half a second (when built with TSX) to four and a half seconds (when built with the branch target buffer). Our results indicate that weird gates are more generally applicable than previously known and may become more widely used, e.g., for malware obfuscation.
微架构攻击通常利用某种形式的瞬态执行来窃取敏感数据。然而,最近,一类新的攻击使用瞬态执行来(秘密地)计算:Wampler等人使用Spectre原语来混淆控制流,Evtyushkin等人构建了“奇怪的”逻辑门,使用英特尔的TSX完全使用微架构的副作用进行计算(即,在缓存侧通道中)。本文推广了TSX之外的怪异门结构,并展示了如何使用任何瞬态执行原语构建此类门。我们使用异常、分支预测器和分支目标缓冲区构建逻辑门,并且我们设计了一个看起来执行大约一个数量级的非门。原始论文中的数据报告了异或执行速度和每秒异或执行次数彼此不一致。从执行速度的表面上看,我们的构造要快两个数量级;相反,我们计算出它们报告的每秒执行数的更快的执行速度,我们的方法只产生一个数量级的改进。比之前的技术水平要好。这些结构适用于AMD、Intel和ARM机器,精度约为95-99%;一百万次AND门的执行时间从半秒(使用TSX构建时)到4.5秒(使用分支目标缓冲区构建时)不等。我们的研究结果表明,怪异门比以前已知的更普遍适用,并且可能会被更广泛地使用,例如,用于恶意软件混淆。
{"title":"The ghost is the machine: Weird machines in transient execution","authors":"Ping-Lun Wang, Fraser Brown, R. Wahby","doi":"10.1109/SPW59333.2023.00029","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00029","url":null,"abstract":"Microarchitectural attacks typically exploit some form of transient execution to steal sensitive data. More recently, though, a new class of attacks has used transient execution to (covertly) compute: Wampler et al. use Spectre primitives to obfuscate control flow, and Evtyushkin et al. construct “weird” logic gates that use Intel's TSX to compute entirely using microarchitectural side effects (i.e., in a cache side channel). This paper generalizes weird gate constructions beyond TSX and shows how to build such gates using any transient execution primitive. We build logic gates using exceptions, the branch predictor, and the branch target buffer, and we design a NOT gate that appears to perform roughly one order of magnitude11The data in the original paper reports XOR execution speed and XOR executions per second that do not agree with one another. Taking the execution speed at face value, our construction is two orders of magnitude faster; instead, we calculate a faster execution speed for their reported executions per second, and our approach only yields an order of magnitude improvement. better than the prior state of the art. These constructions work on AMD, Intel, and ARM machines with ≈95-99% accuracy; a million AND gate executions take from half a second (when built with TSX) to four and a half seconds (when built with the branch target buffer). Our results indicate that weird gates are more generally applicable than previously known and may become more widely used, e.g., for malware obfuscation.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133864266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects 小海豹虫:轻型反射物体的光学声音恢复
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00032
Ben Nassi, R. Swissa, Y. Elovici, B. Zadov
In recent years, various studies have demonstrated methods to recover sound/speech with an optical sensor. Fortunately, each of these methods possess drawbacks limiting their utility (e.g., limited to recovering sounds at high volumes, utilize a sensor indicating their use, rely on objects not commonly found in offices, require preliminary data collection, etc.). One unaddressed method of recovering speech optically is via observing lightweight reflective objects (e.g., iced coffee can, smartphone stand, desk ornament) with a photodiode, an optical sensor used to convert photons to electricity. In this paper, we present the ‘little seal bug’ attack, an optical side-channel attack which exploits fluctuations in air pressure on the surface of a shiny object occurring in response to sound, to recover speech optically and passively using a photodiode. These air pressure fluctuations cause the shiny object to vibrate and reflect light modulated by the nearby sound; as a result, these objects can be used by eavesdroppers (e.g., private investigator, surveilling spouse) to recover the content of a victim's conversation when the victim is near such objects. We show how to determine the sensitivity specifications of the optical equipment (photodiode, ADC, etc.) needed to recover the minuscule vibrations of lightweight shiny objects caused by the surrounding sound waves. Given the optical measurements obtained from light reflected off shiny objects, we design and utilize an algorithm to isolate the speech contents from the optical measurements. In our evaluation of the ‘little seal bug’ attack, we compare its performance to that of related methods. We find eavesdroppers can exploit various lightweight shiny objects to optically recover the content of conversations at equal/higher quality than prior methods (fair-excellent intelligibility) while doing so from greater distances (up to 35 meters) and lower speech volumes (75 dB). We conclude that lightweight shiny objects are a potent attack vector for recovering speech optically, and can be harmful to victims being targeted for sensitive information conveyed in a spoken conversation (e.g., in cases of corporate espionage or intimate partner violence/surveillance) when seated at a desk near a lightweight reflective object.
近年来,各种研究已经证明了用光学传感器恢复声音/语音的方法。幸运的是,这些方法中的每一种都有限制其实用性的缺点(例如,仅限于恢复高音量的声音,使用指示其使用的传感器,依赖办公室中不常见的物体,需要初步数据收集等)。一种尚未解决的光学恢复语音的方法是通过使用光电二极管观察轻型反射物体(例如,冰咖啡罐,智能手机支架,桌面装饰品),光电二极管是一种用于将光子转换为电能的光学传感器。在本文中,我们提出了“小密封虫”攻击,这是一种光学侧通道攻击,利用响应声音而发生的发光物体表面气压波动来光学和被动地使用光电二极管恢复语音。这些气压波动导致闪亮的物体振动并反射附近声音调制的光;因此,当受害者靠近这些物体时,窃听者(例如私家侦探、监视配偶)可以利用这些物体来恢复受害者的谈话内容。我们展示了如何确定光学设备(光电二极管,ADC等)的灵敏度规格,以恢复由周围声波引起的轻质闪亮物体的微小振动。考虑到从闪亮物体反射的光中获得的光学测量,我们设计并利用了一种算法来将语音内容从光学测量中分离出来。在我们对“小印章bug”攻击的评估中,我们将其性能与相关方法进行了比较。我们发现窃听者可以利用各种轻质发光物体以光学方式恢复对话内容,其质量与以前的方法(相当出色的可理解性)相同/更高,同时距离更远(高达35米),语音音量更低(75分贝)。我们得出的结论是,轻质闪亮物体是恢复语音光学的有力攻击载体,并且当受害者坐在靠近轻质反射物体的桌子旁时,可能会对口头对话中传达的敏感信息(例如,在企业间谍或亲密伴侣暴力/监视的情况下)造成伤害。
{"title":"The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects","authors":"Ben Nassi, R. Swissa, Y. Elovici, B. Zadov","doi":"10.1109/SPW59333.2023.00032","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00032","url":null,"abstract":"In recent years, various studies have demonstrated methods to recover sound/speech with an optical sensor. Fortunately, each of these methods possess drawbacks limiting their utility (e.g., limited to recovering sounds at high volumes, utilize a sensor indicating their use, rely on objects not commonly found in offices, require preliminary data collection, etc.). One unaddressed method of recovering speech optically is via observing lightweight reflective objects (e.g., iced coffee can, smartphone stand, desk ornament) with a photodiode, an optical sensor used to convert photons to electricity. In this paper, we present the ‘little seal bug’ attack, an optical side-channel attack which exploits fluctuations in air pressure on the surface of a shiny object occurring in response to sound, to recover speech optically and passively using a photodiode. These air pressure fluctuations cause the shiny object to vibrate and reflect light modulated by the nearby sound; as a result, these objects can be used by eavesdroppers (e.g., private investigator, surveilling spouse) to recover the content of a victim's conversation when the victim is near such objects. We show how to determine the sensitivity specifications of the optical equipment (photodiode, ADC, etc.) needed to recover the minuscule vibrations of lightweight shiny objects caused by the surrounding sound waves. Given the optical measurements obtained from light reflected off shiny objects, we design and utilize an algorithm to isolate the speech contents from the optical measurements. In our evaluation of the ‘little seal bug’ attack, we compare its performance to that of related methods. We find eavesdroppers can exploit various lightweight shiny objects to optically recover the content of conversations at equal/higher quality than prior methods (fair-excellent intelligibility) while doing so from greater distances (up to 35 meters) and lower speech volumes (75 dB). We conclude that lightweight shiny objects are a potent attack vector for recovering speech optically, and can be harmful to victims being targeted for sensitive information conveyed in a spoken conversation (e.g., in cases of corporate espionage or intimate partner violence/surveillance) when seated at a desk near a lightweight reflective object.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Parser Differential Anti-Patterns 解析器微分反模式综述
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00016
Sameed Ali, Sean W. Smith
Parser differentials emerge when two (or more) parsers interpret the same input in different ways. Differences in parsing behavior are difficult to detect due to (1) challenges in abstracting out the parser from complex code-bases and (2) proving the equivalence of parsers. Parser differentials remain understudied as they are a novel unexpected bug resulting from the interaction of software components—sometimes even independent modules—which may individually appear bug-free. We present a survey of many known parser differentials and conduct a root-cause analysis of them. We do so with an aim to uncover insights on how we can best conceptualize the underlying causes of their emergence. In studying these differentials, we have isolated certain design anti-patterns that give rise to parser differentials in software systems. We show how these differentials do not fit nicely into the state-of-the-art model of parser differentials and thus propose improvements to it.
当两个(或多个)解析器以不同的方式解释相同的输入时,就会出现解析器差异。解析行为的差异很难检测,因为(1)从复杂的代码库中抽象出解析器存在挑战,(2)证明解析器的等价性。解析器的区别仍然没有得到充分的研究,因为它们是由软件组件(有时甚至是独立的模块)之间的交互导致的一种意想不到的新错误,而这些组件可能单独看起来没有错误。我们对许多已知的解析器差异进行了调查,并对它们进行了根本原因分析。我们这样做的目的是揭示我们如何才能最好地概念化它们出现的潜在原因的见解。在研究这些差异时,我们已经隔离了软件系统中导致解析器差异的某些设计反模式。我们展示了这些差异如何不能很好地适应解析器差异的最新模型,并因此提出了改进建议。
{"title":"A Survey of Parser Differential Anti-Patterns","authors":"Sameed Ali, Sean W. Smith","doi":"10.1109/SPW59333.2023.00016","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00016","url":null,"abstract":"Parser differentials emerge when two (or more) parsers interpret the same input in different ways. Differences in parsing behavior are difficult to detect due to (1) challenges in abstracting out the parser from complex code-bases and (2) proving the equivalence of parsers. Parser differentials remain understudied as they are a novel unexpected bug resulting from the interaction of software components—sometimes even independent modules—which may individually appear bug-free. We present a survey of many known parser differentials and conduct a root-cause analysis of them. We do so with an aim to uncover insights on how we can best conceptualize the underlying causes of their emergence. In studying these differentials, we have isolated certain design anti-patterns that give rise to parser differentials in software systems. We show how these differentials do not fit nicely into the state-of-the-art model of parser differentials and thus propose improvements to it.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep Learning 你的电子邮件地址掌握着关键:用深度学习理解电子邮件和密码安全之间的联系
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00015
Etienne Salimbeni, Nina Mainusch, Dario Pasquini
In this work, we investigate the effectiveness of deep-learning-based password guessing models for targeted attacks on human-chosen passwords. In recent years, service providers have increased the level of security of users' passwords. This is done by requiring more complex password generation patterns and by using computationally expensive hash functions. For the attackers this means a reduced number of available guessing attempts, which introduces the necessity to target their guess by exploiting a victim's publicly available information. In this work, we introduce a context-aware password guessing model that better capture attackers' behavior. We demonstrate that knowing a victim's email address is already critical in compromising the associated password and provide an in-depth analysis of the relationship between them. We also show the potential of such models to identify clusters of users based on their password generation behaviour, which can spot fake profiles and populations more vulnerable to context-aware guesses. The code is publicly available at https://github.com/spring-epfl/DCM_sp.
在这项工作中,我们研究了基于深度学习的密码猜测模型对人为选择的密码进行针对性攻击的有效性。近年来,服务提供商提高了用户密码的安全级别。这需要更复杂的密码生成模式和使用计算成本较高的散列函数。对于攻击者来说,这意味着可用的猜测尝试次数减少,这就引入了通过利用受害者的公开信息来瞄准他们的猜测的必要性。在这项工作中,我们引入了一个上下文感知密码猜测模型,可以更好地捕获攻击者的行为。我们证明,了解受害者的电子邮件地址对于泄露相关密码已经至关重要,并提供了对它们之间关系的深入分析。我们还展示了这些模型的潜力,可以根据用户的密码生成行为来识别用户群,这可以发现虚假的个人资料和更容易受到上下文感知猜测的人群。该代码可在https://github.com/spring-epfl/DCM_sp上公开获得。
{"title":"Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep Learning","authors":"Etienne Salimbeni, Nina Mainusch, Dario Pasquini","doi":"10.1109/SPW59333.2023.00015","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00015","url":null,"abstract":"In this work, we investigate the effectiveness of deep-learning-based password guessing models for targeted attacks on human-chosen passwords. In recent years, service providers have increased the level of security of users' passwords. This is done by requiring more complex password generation patterns and by using computationally expensive hash functions. For the attackers this means a reduced number of available guessing attempts, which introduces the necessity to target their guess by exploiting a victim's publicly available information. In this work, we introduce a context-aware password guessing model that better capture attackers' behavior. We demonstrate that knowing a victim's email address is already critical in compromising the associated password and provide an in-depth analysis of the relationship between them. We also show the potential of such models to identify clusters of users based on their password generation behaviour, which can spot fake profiles and populations more vulnerable to context-aware guesses. The code is publicly available at https://github.com/spring-epfl/DCM_sp.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Password Composition Policy and Password Meters of Popular Websites 热门网站密码组合策略及密码计量评估
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00006
Kyungchan Lim, Joshua H. Kang, Matthew Dixson, Hyungjoon Koo, Doowon Kim
Password-based authentication is one of the most commonly adopted mechanisms for online security. Choosing strong passwords is crucial for protecting ones' digital identities and assets, as weak passwords can be readily guessable, resulting in a compromise such as unauthorized access. To promote the use of strong passwords on the Web, the National Institute of Standards and Technology (NIST) provides website administrators with password composition policy (PCP) guidelines. We manually inspect popular websites to check if their password policies conform to NIST's PCP guidelines by generating passwords that meet each criterion and testing the 100 popular websites. Our findings reveal that a considerable number of web sites (on average, 53.5 %) do not comply with the guidelines, which could result in password breaches.
基于密码的身份验证是在线安全最常用的机制之一。选择强密码对于保护个人的数字身份和资产至关重要,因为弱密码很容易被猜测,从而导致未经授权的访问等妥协。为了促进在Web上使用强密码,美国国家标准与技术研究院(NIST)向网站管理员提供了密码组合策略(PCP)指南。我们通过生成符合每个标准的密码并测试100个流行网站,手动检查热门网站的密码策略是否符合NIST的PCP指南。我们的调查结果显示,相当多的网站(平均53.5%)没有遵守指引,这可能导致密码泄露。
{"title":"Evaluating Password Composition Policy and Password Meters of Popular Websites","authors":"Kyungchan Lim, Joshua H. Kang, Matthew Dixson, Hyungjoon Koo, Doowon Kim","doi":"10.1109/SPW59333.2023.00006","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00006","url":null,"abstract":"Password-based authentication is one of the most commonly adopted mechanisms for online security. Choosing strong passwords is crucial for protecting ones' digital identities and assets, as weak passwords can be readily guessable, resulting in a compromise such as unauthorized access. To promote the use of strong passwords on the Web, the National Institute of Standards and Technology (NIST) provides website administrators with password composition policy (PCP) guidelines. We manually inspect popular websites to check if their password policies conform to NIST's PCP guidelines by generating passwords that meet each criterion and testing the 100 popular websites. Our findings reveal that a considerable number of web sites (on average, 53.5 %) do not comply with the guidelines, which could result in password breaches.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode CustomProcessingUnit:英特尔微码的逆向工程和定制
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00031
Pietro Borrello, Catherine Easdon, Martin Schwarzl, Roland Czerny, Michael Schwarz
Microcode provides an abstraction layer over the instruction set to decompose complex instructions into simpler micro-operations that can be more easily implemented in hardware. It is an essential optimization to simplify the design of x86 processors. However, introducing an additional layer of software beneath the instruction set poses security and reliability concerns. The microcode details are confidential to the manufacturers, preventing independent auditing or customization of the microcode. Moreover, microcode patches are signed and encrypted to prevent unauthorized patching and reverse engineering. However, recent research has recovered decrypted microcode and reverse-engineered read/write debug mechanisms on Intel Goldmont (Atom), making analysis and customization of microcode possible on a modern Intel microarchitecture. In this work, we present the first framework for static and dynamic analysis of Intel microcode. Building upon prior research, we reverse-engineer Goldmont microcode semantics and reconstruct the patching primitives for microcode customization. For static analysis, we implement a Ghidra processor module for decompilation and analysis of decrypted microcode. For dynamic analysis, we create a UEFI application that can trace and patch microcode to provide complete microcode control on Goldmont systems. Leveraging our framework, we reverse-engineer the confidential Intel microcode update algorithm and perform the first security analysis of its design and implementation. In three further case studies, we illustrate the potential security and performance benefits of microcode customization. We provide the first x86 Pointer Authentication Code (PAC) microcode implementation and its security evaluation, design and implement fast software breakpoints that are more than 1000x faster than standard breakpoints, and present constant-time microcode division, illustrating the potential security and performance benefits of microcode customization.
微码在指令集上提供了一个抽象层,将复杂的指令分解为更容易在硬件中实现的更简单的微操作。这是简化x86处理器设计的必要优化。然而,在指令集下面引入一个额外的软件层会带来安全性和可靠性问题。微码细节对制造商保密,防止对微码进行独立审计或定制。此外,微码补丁被签名和加密,以防止未经授权的补丁和逆向工程。然而,最近的研究已经恢复了英特尔Goldmont (Atom)上解密的微码和反向工程的读/写调试机制,使得在现代英特尔微架构上分析和定制微码成为可能。在这项工作中,我们提出了第一个静态和动态分析英特尔微码的框架。在先前研究的基础上,我们对Goldmont微码语义进行了逆向工程,并重建了用于微码定制的补丁原语。对于静态分析,我们实现了一个Ghidra处理器模块,用于反编译和分析解密的微码。对于动态分析,我们创建了一个UEFI应用程序,可以跟踪和修补微码,从而在Goldmont系统上提供完整的微码控制。利用我们的框架,我们对机密的英特尔微码更新算法进行了逆向工程,并对其设计和实现进行了首次安全分析。在接下来的三个案例研究中,我们将说明微代码定制的潜在安全性和性能优势。我们提供了第一个x86指针认证码(PAC)微码实现及其安全评估,设计并实现了比标准断点快1000倍以上的快速软件断点,并提供了恒定时间的微码划分,说明了微码定制的潜在安全性和性能优势。
{"title":"CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode","authors":"Pietro Borrello, Catherine Easdon, Martin Schwarzl, Roland Czerny, Michael Schwarz","doi":"10.1109/SPW59333.2023.00031","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00031","url":null,"abstract":"Microcode provides an abstraction layer over the instruction set to decompose complex instructions into simpler micro-operations that can be more easily implemented in hardware. It is an essential optimization to simplify the design of x86 processors. However, introducing an additional layer of software beneath the instruction set poses security and reliability concerns. The microcode details are confidential to the manufacturers, preventing independent auditing or customization of the microcode. Moreover, microcode patches are signed and encrypted to prevent unauthorized patching and reverse engineering. However, recent research has recovered decrypted microcode and reverse-engineered read/write debug mechanisms on Intel Goldmont (Atom), making analysis and customization of microcode possible on a modern Intel microarchitecture. In this work, we present the first framework for static and dynamic analysis of Intel microcode. Building upon prior research, we reverse-engineer Goldmont microcode semantics and reconstruct the patching primitives for microcode customization. For static analysis, we implement a Ghidra processor module for decompilation and analysis of decrypted microcode. For dynamic analysis, we create a UEFI application that can trace and patch microcode to provide complete microcode control on Goldmont systems. Leveraging our framework, we reverse-engineer the confidential Intel microcode update algorithm and perform the first security analysis of its design and implementation. In three further case studies, we illustrate the potential security and performance benefits of microcode customization. We provide the first x86 Pointer Authentication Code (PAC) microcode implementation and its security evaluation, design and implement fast software breakpoints that are more than 1000x faster than standard breakpoints, and present constant-time microcode division, illustrating the potential security and performance benefits of microcode customization.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130737765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SafeFL: MPC-friendly Framework for Private and Robust Federated Learning SafeFL: mpc友好的私有和鲁棒联邦学习框架
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00012
Till Gehlhar, F. Marx, T. Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
Federated learning (FL) has gained widespread popularity in a variety of industries due to its ability to locally train models on devices while preserving privacy. However, FL systems are susceptible to i) privacy inference attacks and ii) poisoning attacks, which can compromise the system by corrupt actors. Despite a significant amount of work being done to tackle these attacks individually, the combination of these two attacks has received limited attention in the research community. To address this gap, we introduce SafeFL, a secure multiparty computation (MPC)-based framework designed to assess the efficacy of FL techniques in addressing both privacy inference and poisoning attacks. The heart of the SafeFL framework is a communicator interface that enables PyTorch-based implementations to utilize the well-established MP-SPDZ framework, which implements various MPC protocols. The goal of SafeFL is to facilitate the development of more efficient FL systems that can effectively address privacy inference and poisoning attacks.
联邦学习(FL)由于能够在保护隐私的同时在设备上本地训练模型而在各种行业中获得了广泛的普及。然而,FL系统容易受到i)隐私推断攻击和ii)中毒攻击的影响,这可能会导致腐败行为者破坏系统。尽管在单独解决这些攻击方面已经做了大量的工作,但这两种攻击的结合在研究界受到的关注有限。为了解决这一差距,我们引入了SafeFL,这是一个基于安全多方计算(MPC)的框架,旨在评估FL技术在解决隐私推断和中毒攻击方面的有效性。SafeFL框架的核心是一个通信器接口,它使基于pytorch的实现能够利用完善的MP-SPDZ框架,该框架实现了各种MPC协议。SafeFL的目标是促进更有效的FL系统的开发,可以有效地解决隐私推断和中毒攻击。
{"title":"SafeFL: MPC-friendly Framework for Private and Robust Federated Learning","authors":"Till Gehlhar, F. Marx, T. Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame","doi":"10.1109/SPW59333.2023.00012","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00012","url":null,"abstract":"Federated learning (FL) has gained widespread popularity in a variety of industries due to its ability to locally train models on devices while preserving privacy. However, FL systems are susceptible to i) privacy inference attacks and ii) poisoning attacks, which can compromise the system by corrupt actors. Despite a significant amount of work being done to tackle these attacks individually, the combination of these two attacks has received limited attention in the research community. To address this gap, we introduce SafeFL, a secure multiparty computation (MPC)-based framework designed to assess the efficacy of FL techniques in addressing both privacy inference and poisoning attacks. The heart of the SafeFL framework is a communicator interface that enables PyTorch-based implementations to utilize the well-established MP-SPDZ framework, which implements various MPC protocols. The goal of SafeFL is to facilitate the development of more efficient FL systems that can effectively address privacy inference and poisoning attacks.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133938460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GPThreats-3: Is Automatic Malware Generation a Threat? GPThreats-3:自动生成恶意软件是一种威胁吗?
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00027
Marcus Botacin
Recent research advances introduced large textual models, of which GPT-3 is state-of-the-art. They enable many applications, such as generating text and code. Whereas the model's capabilities might be explored for good, they might also cause some negative impact: The model's code generation capabilities might be used by attackers to assist in malware creation, a phenomenon that must be understood. In this work, our goal is to answer the question: Can current large textual models (represented by GPT-3) already be used by attackers to generate malware? If so: How can attackers use these models? We explore multiple coding strategies, ranging from the entire mal ware description to separate descriptions of mal ware functions that can be used as building blocks. We also test the model's ability to rewrite malware code in multiple manners. Our experiments show that GPT-3 still has trouble generating entire malware samples from complete descriptions but that it can easily construct malware via building block descriptions. It also still has limitations to understand the described contexts, but once it is done it generates multiple versions of the same semantic (malware variants), whose detection rate significantly varies (from 4 to 55 Virustotal AV s).
最近的研究进展介绍了大型文本模型,其中GPT-3是最先进的。它们支持许多应用程序,例如生成文本和代码。尽管模型的功能可能会得到很好的探索,但它们也可能会产生一些负面影响:攻击者可能会使用模型的代码生成功能来协助恶意软件的创建,这是一个必须理解的现象。在这项工作中,我们的目标是回答这样一个问题:当前的大型文本模型(由GPT-3表示)是否已经被攻击者用来生成恶意软件?如果是这样:攻击者如何使用这些模型?我们探索了多种编码策略,从整个恶意软件描述到可用作构建块的恶意软件功能的单独描述。我们还测试了该模型以多种方式重写恶意软件代码的能力。我们的实验表明,GPT-3仍然难以从完整的描述生成整个恶意软件样本,但它可以很容易地通过构建块描述构建恶意软件。它在理解所描述的上下文方面仍然有局限性,但一旦完成,它就会生成相同语义的多个版本(恶意软件变体),其检测率也会有很大差异(从4到55个虚拟AV)。
{"title":"GPThreats-3: Is Automatic Malware Generation a Threat?","authors":"Marcus Botacin","doi":"10.1109/SPW59333.2023.00027","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00027","url":null,"abstract":"Recent research advances introduced large textual models, of which GPT-3 is state-of-the-art. They enable many applications, such as generating text and code. Whereas the model's capabilities might be explored for good, they might also cause some negative impact: The model's code generation capabilities might be used by attackers to assist in malware creation, a phenomenon that must be understood. In this work, our goal is to answer the question: Can current large textual models (represented by GPT-3) already be used by attackers to generate malware? If so: How can attackers use these models? We explore multiple coding strategies, ranging from the entire mal ware description to separate descriptions of mal ware functions that can be used as building blocks. We also test the model's ability to rewrite malware code in multiple manners. Our experiments show that GPT-3 still has trouble generating entire malware samples from complete descriptions but that it can easily construct malware via building block descriptions. It also still has limitations to understand the described contexts, but once it is done it generates multiple versions of the same semantic (malware variants), whose detection rate significantly varies (from 4 to 55 Virustotal AV s).","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blind Spots: Identifying Exploitable Program Inputs 盲点:识别可利用的程序输入
Pub Date : 2023-05-01 DOI: 10.1109/SPW59333.2023.00021
Henrik Brodin, Marek Surovic, E. Sultanik
A blind spot is any input to a program that can be arbitrarily mutated without affecting the program's output. Blind spots can be used for steganography or to embed malware payloads. If blind spots overlap file format keywords, they indicate parsing bugs that can lead to exploitable differentials. For example, one could craft a document that renders one way in one viewer and a completely different way in another viewer. They have also been used to circumvent code signing in Android binaries, to coerce certificate authorities to misbehave, and to execute HTTP request smuggling and parameter pollution attacks. This paper formalizes the operational semantics of blind spots, leading to a technique based on dynamic information flow tracking that automatically detects blind spots. An efficient implementation is introduced and evaluated against a corpus of over a thousand diverse PDFs parsed through MµPDF11https://mupdf.com/, revealing exploitable bugs in the parser. All of the blind spot classifications are confirmed to be correct and the missed detection rate is no higher than 11 %. On average, at least 5 % of each PDF file is completely ignored by the parser. Our results show promise that this technique is an efficient automated means to detect exploitable parser bugs, over-permissiveness and differentials. Nothing in the technique is tied to PDF in general, so it can be immediately applied to other notoriously difficult-to-parse formats like ELF, X.509, and XML.
盲点是可以任意改变而不影响程序输出的任何程序输入。盲点可用于隐写或嵌入恶意软件有效载荷。如果盲点与文件格式关键字重叠,则表明可能导致可利用差异的解析错误。例如,可以制作一个文档,在一个查看器中以一种方式呈现,而在另一个查看器中以完全不同的方式呈现。它们还被用来规避Android二进制文件中的代码签名,强迫证书颁发机构行为不当,以及执行HTTP请求走私和参数污染攻击。本文将盲点的操作语义形式化,提出了一种基于动态信息流跟踪的盲点自动检测技术。介绍了一个有效的实现,并对通过MµPDF11https://mupdf.com/解析的一千多个不同的pdf进行了评估,揭示了解析器中可利用的错误。所有盲点分类均证实正确,漏检率不高于11%。平均而言,每个PDF文件中至少有5%被解析器完全忽略。我们的结果表明,这种技术是一种有效的自动化方法,可以检测可利用的解析器错误、过度许可和差异。一般来说,该技术与PDF无关,因此它可以立即应用于其他众所周知的难以解析的格式,如ELF、X.509和XML。
{"title":"Blind Spots: Identifying Exploitable Program Inputs","authors":"Henrik Brodin, Marek Surovic, E. Sultanik","doi":"10.1109/SPW59333.2023.00021","DOIUrl":"https://doi.org/10.1109/SPW59333.2023.00021","url":null,"abstract":"A blind spot is any input to a program that can be arbitrarily mutated without affecting the program's output. Blind spots can be used for steganography or to embed malware payloads. If blind spots overlap file format keywords, they indicate parsing bugs that can lead to exploitable differentials. For example, one could craft a document that renders one way in one viewer and a completely different way in another viewer. They have also been used to circumvent code signing in Android binaries, to coerce certificate authorities to misbehave, and to execute HTTP request smuggling and parameter pollution attacks. This paper formalizes the operational semantics of blind spots, leading to a technique based on dynamic information flow tracking that automatically detects blind spots. An efficient implementation is introduced and evaluated against a corpus of over a thousand diverse PDFs parsed through MµPDF11https://mupdf.com/, revealing exploitable bugs in the parser. All of the blind spot classifications are confirmed to be correct and the missed detection rate is no higher than 11 %. On average, at least 5 % of each PDF file is completely ignored by the parser. Our results show promise that this technique is an efficient automated means to detect exploitable parser bugs, over-permissiveness and differentials. Nothing in the technique is tied to PDF in general, so it can be immediately applied to other notoriously difficult-to-parse formats like ELF, X.509, and XML.","PeriodicalId":308378,"journal":{"name":"2023 IEEE Security and Privacy Workshops (SPW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1