首页 > 最新文献

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security最新文献

英文 中文
Release the Kraken: New KRACKs in the 802.11 Standard 发布Kraken: 802.11标准中的新KRACKs
M. Vanhoef, F. Piessens
We improve key reinstallation attacks (KRACKs) against 802.11 by generalizing known attacks, systematically analyzing all handshakes, bypassing 802.11's official countermeasure, auditing (flawed) patches, and enhancing attacks using implementation-specific bugs. Last year it was shown that several handshakes in the 802.11 standard were vulnerable to key reinstallation attacks. These attacks manipulate handshake messages to reinstall an already-in-use key, leading to both nonce reuse and replay attacks. We extend this work in several directions. First, we generalize attacks against the 4-way handshake so they no longer rely on hard-to-win race conditions, and we employ a more practical method to obtain the required man-in-the-middle (MitM) position. Second, we systematically investigate the 802.11 standard for key reinstallation vulnerabilities, and show that the Fast Initial Link Setup (FILS) and Tunneled direct-link setup PeerKey (TPK) handshakes are also vulnerable to key reinstallations. These handshakes increase roaming speed, and enable direct connectivity between clients, respectively. Third, we abuse Wireless Network Management (WNM) power-save features to trigger reinstallations of the group key. Moreover, we bypass (and improve) the official countermeasure of 802.11. In particular, group key reinstallations were still possible by combining EAPOL-Key and WNM-Sleep frames. We also found implementation-specific flaws that facilitate key reinstallations. For example, some devices reuse the ANonce and SNonce in the 4-way handshake, accept replayed message 4's, or improperly install the group key. We conclude that preventing key reinstallations is harder than expected, and believe that (formally) modeling 802.11 would help to better secure both implementations and the standard itself.
我们通过概括已知攻击、系统地分析所有握手、绕过802.11的官方对策、审计(有缺陷的)补丁以及使用特定于实现的错误增强攻击来改进针对802.11的密钥重装攻击(KRACKs)。去年有证据表明,802.11标准中的几个握手很容易受到密钥重装攻击。这些攻击会操纵握手消息来重新安装已经在使用的密钥,从而导致非once重用和重放攻击。我们把这项工作扩展到几个方向。首先,我们概括了针对4次握手的攻击,因此它们不再依赖于难以获胜的竞争条件,并且我们采用了一种更实用的方法来获得所需的中间人(MitM)位置。其次,我们系统地研究了802.11标准中的密钥重装漏洞,并表明快速初始链路设置(FILS)和隧道直接链路设置PeerKey (TPK)握手也容易受到密钥重装的影响。这些握手分别提高了漫游速度,并实现了客户机之间的直接连接。第三,我们滥用无线网络管理(WNM)省电功能来触发重新安装组密钥。此外,我们绕过(并改进)802.11的官方对策。特别是,通过结合epol - key和WNM-Sleep帧,仍然可以重新安装组密钥。我们还发现了促进关键重新安装的特定于实现的缺陷。例如,一些设备在4次握手中重用ANonce和SNonce,接受重放的消息4,或者不正确地安装组密钥。我们得出的结论是,防止密钥重新安装比预期的要困难,并且相信(正式地)对802.11建模将有助于更好地保护实现和标准本身。
{"title":"Release the Kraken: New KRACKs in the 802.11 Standard","authors":"M. Vanhoef, F. Piessens","doi":"10.1145/3243734.3243807","DOIUrl":"https://doi.org/10.1145/3243734.3243807","url":null,"abstract":"We improve key reinstallation attacks (KRACKs) against 802.11 by generalizing known attacks, systematically analyzing all handshakes, bypassing 802.11's official countermeasure, auditing (flawed) patches, and enhancing attacks using implementation-specific bugs. Last year it was shown that several handshakes in the 802.11 standard were vulnerable to key reinstallation attacks. These attacks manipulate handshake messages to reinstall an already-in-use key, leading to both nonce reuse and replay attacks. We extend this work in several directions. First, we generalize attacks against the 4-way handshake so they no longer rely on hard-to-win race conditions, and we employ a more practical method to obtain the required man-in-the-middle (MitM) position. Second, we systematically investigate the 802.11 standard for key reinstallation vulnerabilities, and show that the Fast Initial Link Setup (FILS) and Tunneled direct-link setup PeerKey (TPK) handshakes are also vulnerable to key reinstallations. These handshakes increase roaming speed, and enable direct connectivity between clients, respectively. Third, we abuse Wireless Network Management (WNM) power-save features to trigger reinstallations of the group key. Moreover, we bypass (and improve) the official countermeasure of 802.11. In particular, group key reinstallations were still possible by combining EAPOL-Key and WNM-Sleep frames. We also found implementation-specific flaws that facilitate key reinstallations. For example, some devices reuse the ANonce and SNonce in the 4-way handshake, accept replayed message 4's, or improperly install the group key. We conclude that preventing key reinstallations is harder than expected, and believe that (formally) modeling 802.11 would help to better secure both implementations and the standard itself.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128283366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Tiresias: Predicting Security Events Through Deep Learning 泰瑞西亚斯:通过深度学习预测安全事件
Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, G. Stringhini
With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (eg. whether an attack would happen or not), but not at the specific steps that an attacker would undertake. To fill this gap we present Tiresias xspace, a system that leverages Recurrent Neural Networks (RNNs) to predict future events on a machine, based on previous observations. We test Tiresias xspace on a dataset of 3.4 billion security events collected from a commercial intrusion prevention system, and show that our approach is effective in predicting the next event that will occur on a machine with a precision of up to 0.93. We also show that the models learned by Tiresias xspace are reasonably stable over time, and provide a mechanism that can identify sudden drops in precision and trigger a retraining of the system. Finally, we show that the long-term memory typical of RNNs is key in performing event prediction, rendering simpler methods not up to the task.
随着现代计算机攻击的复杂性增加,防御者不仅需要在恶意活动发生时检测到恶意活动,还需要预测攻击者在执行攻击时将采取的具体步骤。然而,这仍然是一个开放的研究问题,以前预测恶意事件的研究只关注二进制结果(例如。攻击是否会发生),而不是攻击者将采取的具体步骤。为了填补这一空白,我们提出了Tiresias xspace,这是一个利用递归神经网络(rnn)来预测机器上未来事件的系统,基于之前的观察。我们在从商业入侵防御系统收集的34亿个安全事件的数据集上测试了Tiresias xspace,并表明我们的方法在预测机器上将发生的下一个事件方面是有效的,精度高达0.93。我们还表明,由Tiresias xspace学习的模型随着时间的推移是相当稳定的,并提供了一种机制,可以识别精度的突然下降并触发系统的重新训练。最后,我们表明典型的rnn的长期记忆是执行事件预测的关键,使得更简单的方法无法胜任这项任务。
{"title":"Tiresias: Predicting Security Events Through Deep Learning","authors":"Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, G. Stringhini","doi":"10.1145/3243734.3243811","DOIUrl":"https://doi.org/10.1145/3243734.3243811","url":null,"abstract":"With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (eg. whether an attack would happen or not), but not at the specific steps that an attacker would undertake. To fill this gap we present Tiresias xspace, a system that leverages Recurrent Neural Networks (RNNs) to predict future events on a machine, based on previous observations. We test Tiresias xspace on a dataset of 3.4 billion security events collected from a commercial intrusion prevention system, and show that our approach is effective in predicting the next event that will occur on a machine with a precision of up to 0.93. We also show that the models learned by Tiresias xspace are reasonably stable over time, and provide a mechanism that can identify sudden drops in precision and trigger a retraining of the system. Finally, we show that the long-term memory typical of RNNs is key in performing event prediction, rendering simpler methods not up to the task.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
Predicting Impending Exposure to Malicious Content from User Behavior 从用户行为中预测即将暴露的恶意内容
Mahmood Sharif, J. Urakawa, Nicolas Christin, A. Kubota, A. Yamada
Many computer-security defenses are reactive---they operate only when security incidents take place, or immediately thereafter. Recent efforts have attempted to predict security incidents before they occur, to enable defenders to proactively protect their devices and networks. These efforts have primarily focused on long-term predictions. We propose a system that enables proactive defenses at the level of a single browsing session. By observing user behavior, it can predict whether they will be exposed to malicious content on the web seconds before the moment of exposure, thus opening a window of opportunity for proactive defenses. We evaluate our system using three months' worth of HTTP traffic generated by 20,645 users of a large cellular provider in 2017 and show that it can be helpful, even when only very low false positive rates are acceptable, and despite the difficulty of making "on-the-fly'' predictions. We also engage directly with the users through surveys asking them demographic and security-related questions, to evaluate the utility of self-reported data for predicting exposure to malicious content. We find that self-reported data can help forecast exposure risk over long periods of time. However, even on the long-term, self-reported data is not as crucial as behavioral measurements to accurately predict exposure.
许多计算机安全防御都是被动的——它们只在安全事件发生时或发生后立即起作用。最近的努力试图在安全事件发生之前预测它们,使防御者能够主动保护他们的设备和网络。这些努力主要集中在长期预测上。我们提出了一种能够在单个浏览会话级别上进行主动防御的系统。通过观察用户行为,它可以提前几秒预测用户是否会接触到网络上的恶意内容,从而为主动防御打开了机会之窗。我们使用2017年由一家大型移动运营商的20,645名用户生成的三个月的HTTP流量来评估我们的系统,并表明它是有帮助的,即使只有非常低的误报率是可接受的,尽管很难做出“即时”预测。我们还通过调查直接与用户接触,询问他们人口统计和安全相关问题,以评估自我报告数据在预测恶意内容暴露方面的效用。我们发现,自我报告的数据可以帮助预测长期暴露的风险。然而,即使从长期来看,自我报告的数据也不如准确预测暴露的行为测量那么重要。
{"title":"Predicting Impending Exposure to Malicious Content from User Behavior","authors":"Mahmood Sharif, J. Urakawa, Nicolas Christin, A. Kubota, A. Yamada","doi":"10.1145/3243734.3243779","DOIUrl":"https://doi.org/10.1145/3243734.3243779","url":null,"abstract":"Many computer-security defenses are reactive---they operate only when security incidents take place, or immediately thereafter. Recent efforts have attempted to predict security incidents before they occur, to enable defenders to proactively protect their devices and networks. These efforts have primarily focused on long-term predictions. We propose a system that enables proactive defenses at the level of a single browsing session. By observing user behavior, it can predict whether they will be exposed to malicious content on the web seconds before the moment of exposure, thus opening a window of opportunity for proactive defenses. We evaluate our system using three months' worth of HTTP traffic generated by 20,645 users of a large cellular provider in 2017 and show that it can be helpful, even when only very low false positive rates are acceptable, and despite the difficulty of making \"on-the-fly'' predictions. We also engage directly with the users through surveys asking them demographic and security-related questions, to evaluate the utility of self-reported data for predicting exposure to malicious content. We find that self-reported data can help forecast exposure risk over long periods of time. However, even on the long-term, self-reported data is not as crucial as behavioral measurements to accurately predict exposure.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114434818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Session details: Session 7A: Forensics 会议详情:会议7A:取证
Sadia Afroz
{"title":"Session details: Session 7A: Forensics","authors":"Sadia Afroz","doi":"10.1145/3285885","DOIUrl":"https://doi.org/10.1145/3285885","url":null,"abstract":"","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125989624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy CPS-SPC 2018第四届网络物理系统安全与隐私研讨会
A. Rashid, Nils Ole Tippenhauer
Cyber-Physical Systems (CPS) are becoming increasingly critical for the well-being of society (e.g., electricity generation and distribution, water treatment, implantable medical devices etc.). While the convergence of computing, communications and physical control in such systems provides benefits in terms of efficiency and convenience, the attack surface resulting from this convergence poses unique security and privacy challenges. These systems represent the new frontier for cyber risk. CPS-SPC is an annual forum in its 4th edition this year, that aims to provide a focal point for the research community to begin addressing the security and privacy challenges of CPS in a comprehensive and multidisciplinary manner and, in tandem with other efforts, build a comprehensive research road map.
网络物理系统(CPS)对社会的福祉变得越来越重要(例如,发电和配电,水处理,植入式医疗设备等)。虽然在这样的系统中,计算、通信和物理控制的融合在效率和便利性方面提供了好处,但这种融合所产生的攻击面带来了独特的安全和隐私挑战。这些系统代表了网络风险的新前沿。CPS- spc是今年第四届的年度论坛,旨在为研究界提供一个焦点,以全面和多学科的方式开始解决CPS的安全和隐私挑战,并与其他努力相结合,建立一个全面的研究路线图。
{"title":"CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy","authors":"A. Rashid, Nils Ole Tippenhauer","doi":"10.1145/3243734.3243874","DOIUrl":"https://doi.org/10.1145/3243734.3243874","url":null,"abstract":"Cyber-Physical Systems (CPS) are becoming increasingly critical for the well-being of society (e.g., electricity generation and distribution, water treatment, implantable medical devices etc.). While the convergence of computing, communications and physical control in such systems provides benefits in terms of efficiency and convenience, the attack surface resulting from this convergence poses unique security and privacy challenges. These systems represent the new frontier for cyber risk. CPS-SPC is an annual forum in its 4th edition this year, that aims to provide a focal point for the research community to begin addressing the security and privacy challenges of CPS in a comprehensive and multidisciplinary manner and, in tandem with other efforts, build a comprehensive research road map.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World 你是如何在背后中枪的:对现实世界中加密劫持的系统研究
Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Haixin Duan
As a new mechanism to monetize web content, cryptocurrency mining is becoming increasingly popular. The idea is simple: a webpage delivers extra workload (JavaScript) that consumes computational resources on the client machine to solve cryptographic puzzles, typically without notifying users or having explicit user consent. This new mechanism, often heavily abused and thus considered a threat termed "cryptojacking", is estimated to affect over 10 million web users every month; however, only a few anecdotal reports exist so far and little is known about its severeness, infrastructure, and technical characteristics behind the scene. This is likely due to the lack of effective approaches to detect cryptojacking at a large-scale (e.g., VirusTotal). In this paper, we take a first step towards an in-depth study over cryptojacking. By leveraging a set of inherent characteristics of cryptojacking scripts, we build CMTracker, a behavior-based detector with two runtime profilers for automatically tracking Cryptocurrency Mining scripts and their related domains. Surprisingly, our approach successfully discovered 2,770 unique cryptojacking samples from 853,936 popular web pages, including 868 among top 100K in Alexa list. Leveraging these samples, we gain a more comprehensive picture of the cryptojacking attacks, including their impact, distribution mechanisms, obfuscation, and attempts to evade detection. For instance, a diverse set of organizations benefit from cryptojacking based on the unique wallet ids. In addition, to stay under the radar, they frequently update their attack domains (fastflux) on the order of days. Many attackers also apply evasion techniques, including limiting the CPU usage, obfuscating the code, etc.
作为一种将网络内容货币化的新机制,加密货币挖掘正变得越来越受欢迎。这个想法很简单:一个网页提供额外的工作负载(JavaScript),它消耗客户端机器上的计算资源来解决加密难题,通常没有通知用户或获得明确的用户同意。这种新机制经常被严重滥用,因此被认为是一种被称为“加密劫持”的威胁,据估计每月影响超过1000万网络用户;然而,到目前为止,只有一些轶事报道存在,很少有人知道它的严重性、基础结构和幕后的技术特征。这可能是由于缺乏大规模检测加密劫持的有效方法(例如,VirusTotal)。在本文中,我们迈出了深入研究加密劫持的第一步。通过利用加密劫持脚本的一组固有特征,我们构建了CMTracker,这是一个基于行为的检测器,具有两个运行时分析器,用于自动跟踪加密货币挖掘脚本及其相关域。令人惊讶的是,我们的方法成功地从853,936个热门网页中发现了2,770个独特的加密劫持样本,其中包括Alexa列表前100K中的868个。利用这些样本,我们可以更全面地了解加密劫持攻击,包括它们的影响、分布机制、混淆和逃避检测的尝试。例如,各种各样的组织都受益于基于唯一钱包id的加密劫持。此外,为了保持低调,他们经常以天为单位更新攻击域(fastflux)。许多攻击者还使用规避技术,包括限制CPU使用、混淆代码等。
{"title":"How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World","authors":"Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Haixin Duan","doi":"10.1145/3243734.3243840","DOIUrl":"https://doi.org/10.1145/3243734.3243840","url":null,"abstract":"As a new mechanism to monetize web content, cryptocurrency mining is becoming increasingly popular. The idea is simple: a webpage delivers extra workload (JavaScript) that consumes computational resources on the client machine to solve cryptographic puzzles, typically without notifying users or having explicit user consent. This new mechanism, often heavily abused and thus considered a threat termed \"cryptojacking\", is estimated to affect over 10 million web users every month; however, only a few anecdotal reports exist so far and little is known about its severeness, infrastructure, and technical characteristics behind the scene. This is likely due to the lack of effective approaches to detect cryptojacking at a large-scale (e.g., VirusTotal). In this paper, we take a first step towards an in-depth study over cryptojacking. By leveraging a set of inherent characteristics of cryptojacking scripts, we build CMTracker, a behavior-based detector with two runtime profilers for automatically tracking Cryptocurrency Mining scripts and their related domains. Surprisingly, our approach successfully discovered 2,770 unique cryptojacking samples from 853,936 popular web pages, including 868 among top 100K in Alexa list. Leveraging these samples, we gain a more comprehensive picture of the cryptojacking attacks, including their impact, distribution mechanisms, obfuscation, and attempts to evade detection. For instance, a diverse set of organizations benefit from cryptojacking based on the unique wallet ids. In addition, to stay under the radar, they frequently update their attack domains (fastflux) on the order of days. Many attackers also apply evasion techniques, including limiting the CPU usage, obfuscating the code, etc.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach 另一个文本验证码求解器:基于生成对抗网络的方法
Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang
Despite several attacks have been proposed, text-based CAPTCHAs are still being widely used as a security mechanism. One of the reasons for the pervasive use of text captchas is that many of the prior attacks are scheme-specific and require a labor-intensive and time-consuming process to construct. This means that a change in the captcha security features like a noisier background can simply invalid an earlier attack. This paper presents a generic, yet effective text captcha solver based on the generative adversarial network. Unlike prior machine-learning-based approaches that need a large volume of manually-labeled real captchas to learn an effective solver, our approach requires significantly fewer real captchas but yields much better performance. This is achieved by first learning a captcha synthesizer to automatically generate synthetic captchas to learn a base solver, and then fine-tuning the base solver on a small set of real captchas using transfer learning. We evaluate our approach by applying it to 33 captcha schemes, including 11 schemes that are currently being used by 32 of the top-50 popular websites including Microsoft, Wikipedia, eBay and Google. Our approach is the most capable attack on text captchas seen to date. It outperforms four state-of-the-art text-captcha solvers by not only delivering a significant higher accuracy on all testing schemes, but also successfully attacking schemes where others have zero chance. We show that our approach is highly efficient as it can solve a captcha within 0.05 second using a desktop GPU. We demonstrate that our attack is generally applicable because it can bypass the advanced security features employed by most modern text captcha schemes. We hope the results of our work can encourage the community to revisit the design and practical use of text captchas.
尽管提出了几种攻击,但基于文本的验证码仍然被广泛用作安全机制。文本验证码广泛使用的原因之一是,以前的许多攻击都是特定于方案的,需要耗费大量人力和时间来构建。这意味着captcha安全特性的改变,如嘈杂的背景,可以简单地使早期的攻击无效。本文提出了一种基于生成对抗网络的通用且有效的文本验证码求解器。与之前基于机器学习的方法(需要大量手动标记的真实验证码来学习有效的求解器)不同,我们的方法需要更少的真实验证码,但产生更好的性能。这是通过首先学习一个验证码合成器来自动生成合成验证码来学习基本求解器,然后使用迁移学习在一小组真实验证码上微调基本求解器来实现的。我们通过将其应用于33个验证码方案来评估我们的方法,其中包括11个方案,这些方案目前被前50大流行网站中的32个使用,包括微软、维基百科、eBay和谷歌。我们的方法是迄今为止对文本验证码最有效的攻击。它超越了四种最先进的文本验证码解决方案,不仅在所有测试方案上提供了更高的准确性,而且在其他方案没有机会的情况下成功地攻击了方案。我们证明了我们的方法是高效的,因为它可以在0.05秒内使用桌面GPU解决captcha。我们证明我们的攻击是普遍适用的,因为它可以绕过大多数现代文本验证码方案所采用的高级安全功能。我们希望我们的工作结果可以鼓励社区重新审视文本验证码的设计和实际使用。
{"title":"Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach","authors":"Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang","doi":"10.1145/3243734.3243754","DOIUrl":"https://doi.org/10.1145/3243734.3243754","url":null,"abstract":"Despite several attacks have been proposed, text-based CAPTCHAs are still being widely used as a security mechanism. One of the reasons for the pervasive use of text captchas is that many of the prior attacks are scheme-specific and require a labor-intensive and time-consuming process to construct. This means that a change in the captcha security features like a noisier background can simply invalid an earlier attack. This paper presents a generic, yet effective text captcha solver based on the generative adversarial network. Unlike prior machine-learning-based approaches that need a large volume of manually-labeled real captchas to learn an effective solver, our approach requires significantly fewer real captchas but yields much better performance. This is achieved by first learning a captcha synthesizer to automatically generate synthetic captchas to learn a base solver, and then fine-tuning the base solver on a small set of real captchas using transfer learning. We evaluate our approach by applying it to 33 captcha schemes, including 11 schemes that are currently being used by 32 of the top-50 popular websites including Microsoft, Wikipedia, eBay and Google. Our approach is the most capable attack on text captchas seen to date. It outperforms four state-of-the-art text-captcha solvers by not only delivering a significant higher accuracy on all testing schemes, but also successfully attacking schemes where others have zero chance. We show that our approach is highly efficient as it can solve a captcha within 0.05 second using a desktop GPU. We demonstrate that our attack is generally applicable because it can bypass the advanced security features employed by most modern text captcha schemes. We hope the results of our work can encourage the community to revisit the design and practical use of text captchas.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
ASHES 2018- Workshop on Attacks and Solutions in Hardware Security ASHES 2018-硬件安全攻击与解决方案研讨会
Chip-Hong Chang, J. Guajardo, Daniel E. Holcomb, F. Regazzoni, U. Rührmair
As in the successful first edition, the second Workshop on Attacks and Solutions in Hardware Security (ASHES) 2018 deals with all aspects of hardware security. Among others, this year, the workshop particularly highlights emerging techniques and methods as well as recent application areas within the field. These include new attack vectors, attack countermeasures, and novel designs and implementations on the methodological side, as well as the Internet of Things, automotive security, smart homes, pervasive and wearable computing on the applications side. In order to meet the requirements of these rapidly developing subareas, ASHES calls for paper submissions in four categories: 1) classical full papers; 2) classical short papers; 3) systematization of knowledge papers which overview, structure, and categorize a subarea; and 4) wild and crazy papers whose purpose is rapid dissemination of promising, potentially game-changing ideas.
与成功的第一版一样,第二届硬件安全攻击与解决方案研讨会(ASHES) 2018涉及硬件安全的各个方面。其中,今年的研讨会特别强调了新兴技术和方法以及该领域内的最新应用领域。这些包括新的攻击媒介、攻击对策、方法方面的新设计和实现,以及应用方面的物联网、汽车安全、智能家居、普及和可穿戴计算。为了满足这些快速发展的分领域的要求,ASHES要求提交四类论文:1)经典全文论文;2)经典短篇论文;3)系统化的知识论文,概述、结构和分类一个子领域;4)疯狂的论文,其目的是迅速传播有前途的、可能改变游戏规则的想法。
{"title":"ASHES 2018- Workshop on Attacks and Solutions in Hardware Security","authors":"Chip-Hong Chang, J. Guajardo, Daniel E. Holcomb, F. Regazzoni, U. Rührmair","doi":"10.1145/3243734.3243873","DOIUrl":"https://doi.org/10.1145/3243734.3243873","url":null,"abstract":"As in the successful first edition, the second Workshop on Attacks and Solutions in Hardware Security (ASHES) 2018 deals with all aspects of hardware security. Among others, this year, the workshop particularly highlights emerging techniques and methods as well as recent application areas within the field. These include new attack vectors, attack countermeasures, and novel designs and implementations on the methodological side, as well as the Internet of Things, automotive security, smart homes, pervasive and wearable computing on the applications side. In order to meet the requirements of these rapidly developing subareas, ASHES calls for paper submissions in four categories: 1) classical full papers; 2) classical short papers; 3) systematization of knowledge papers which overview, structure, and categorize a subarea; and 4) wild and crazy papers whose purpose is rapid dissemination of promising, potentially game-changing ideas.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Session 10B: Protocols 会话详细信息:会话10B:协议
Felix Günther
{"title":"Session details: Session 10B: Protocols","authors":"Felix Günther","doi":"10.1145/3285898","DOIUrl":"https://doi.org/10.1145/3285898","url":null,"abstract":"","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128261713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody 具有实际分布式密钥生成和加密货币托管应用的快速安全多方ECDSA
Yehuda Lindell, Ariel Nof
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing, cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA in a distributed manner (known as threshold signing) has received considerable interest. However, despite this interest, there is still no full threshold solution for more than 2 parties (meaning that any t -out-of- n parties can sign, security is preserved for any t-1 or fewer corrupted parties, and tłeq n can be any value thus supporting an honest minority) that has practical key distribution. This is due to the fact that all previous solutions for this utilize Paillier homomorphic encryption, and efficient distributed Paillier key generation for more than two parties is not known. In this paper, we present the first truly practical full threshold ECDSA signing protocol that has both fast signing and fast key distribution. This solves a years-old open problem, and opens the door to practical uses of threshold ECDSA signing that are in demand today. One of these applications is the construction of secure cryptocurrency wallets (where key shares are spread over multiple devices and so are hard to steal) and cryptocurrency custody solutions (where large sums of invested cryptocurrency are strongly protected by splitting the key between a bank/financial institution, the customer who owns the currency, and possibly a third-party trustee, in multiple shares at each). There is growing practical interest in such solutions, but prior to our work these could not be deployed today due to the need for distributed key generation.
ECDSA是一种标准化的签名算法,广泛用于TLS,代码签名,加密货币等。由于其重要性,以分布式方式(称为阈值签名)安全地计算ECDSA的问题引起了相当大的兴趣。然而,尽管有这种兴趣,仍然没有超过2方的完整阈值解决方案(这意味着任何t- out- n方都可以签名,任何t-1或更少的损坏方都可以保留安全性,并且tłeq n可以是任何值,因此支持诚实的少数人)具有实际的密钥分发。这是因为以前的所有解决方案都使用了Paillier同态加密,并且不知道为两个以上的方有效地生成分布式Paillier密钥。在本文中,我们提出了第一个真正实用的具有快速签名和快速密钥分发的全阈值ECDSA签名协议。这解决了一个存在多年的开放性问题,并为目前需求的阈值ECDSA签名的实际应用打开了大门。其中一个应用是构建安全的加密货币钱包(其中密钥份额分布在多个设备上,因此难以窃取)和加密货币托管解决方案(其中大量投资的加密货币通过在银行/金融机构,拥有货币的客户以及可能的第三方受托人之间将密钥拆分为多个股份来得到强有力的保护)。人们对这种解决方案的实际兴趣越来越大,但在我们的工作之前,由于需要分布式密钥生成,这些解决方案目前无法部署。
{"title":"Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody","authors":"Yehuda Lindell, Ariel Nof","doi":"10.1145/3243734.3243788","DOIUrl":"https://doi.org/10.1145/3243734.3243788","url":null,"abstract":"ECDSA is a standardized signing algorithm that is widely used in TLS, code signing, cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA in a distributed manner (known as threshold signing) has received considerable interest. However, despite this interest, there is still no full threshold solution for more than 2 parties (meaning that any t -out-of- n parties can sign, security is preserved for any t-1 or fewer corrupted parties, and tłeq n can be any value thus supporting an honest minority) that has practical key distribution. This is due to the fact that all previous solutions for this utilize Paillier homomorphic encryption, and efficient distributed Paillier key generation for more than two parties is not known. In this paper, we present the first truly practical full threshold ECDSA signing protocol that has both fast signing and fast key distribution. This solves a years-old open problem, and opens the door to practical uses of threshold ECDSA signing that are in demand today. One of these applications is the construction of secure cryptocurrency wallets (where key shares are spread over multiple devices and so are hard to steal) and cryptocurrency custody solutions (where large sums of invested cryptocurrency are strongly protected by splitting the key between a bank/financial institution, the customer who owns the currency, and possibly a third-party trustee, in multiple shares at each). There is growing practical interest in such solutions, but prior to our work these could not be deployed today due to the need for distributed key generation.","PeriodicalId":322687,"journal":{"name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 144
期刊
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1