首页 > 最新文献

2015 10th International Conference on Availability, Reliability and Security最新文献

英文 中文
Yet Another Cybersecurity Roadmapping Methodology 另一种网络安全路线图方法
Davide Ariu, Luca Didaci, G. Fumera, E. Frumento, Federica Freschi, G. Giacinto, F. Roli
In this paper we describe the road mapping methodology we developed in the context of the CyberROAD EU FP7 project, whose aim is to develop a research roadmap for cybercrime and cyber terrorism. To this aim we built on state-of-the-art methodologies and available guidelines, including related projects, and adapted them to the peculiarities of our road mapping subject. In particular, its distinctive feature is that cybercrime and cyber terrorism co-evolve with their contextual environment (i.e., Technology, society, politics and economy), which poses specific challenges to a road mapping effort. Our approach can become a best practice in the field of cyber security, and can be also generalised to phenomena that exhibit a similar, strong co-evolution with their contextual environment. We aim to describe here the road mapping methodology that will lead to the roadmap but not the roadmap itself (this one being, incidentally, still under construction at the time of writing this paper).
在本文中,我们描述了我们在CyberROAD EU FP7项目背景下开发的道路测绘方法,其目的是为网络犯罪和网络恐怖主义制定研究路线图。为此,我们采用了最先进的方法和现有的指导方针,包括相关项目,并使其适应我们的道路测绘主题的特点。特别是,其显著特征是网络犯罪和网络恐怖主义与其上下文环境(即技术、社会、政治和经济)共同发展,这对路线图工作提出了具体挑战。我们的方法可以成为网络安全领域的最佳实践,也可以推广到与其上下文环境表现出类似的、强烈的共同进化的现象。我们的目标是在这里描述将导致路线图的道路映射方法,而不是路线图本身(顺便说一句,在撰写本文时,这一方法仍在构建中)。
{"title":"Yet Another Cybersecurity Roadmapping Methodology","authors":"Davide Ariu, Luca Didaci, G. Fumera, E. Frumento, Federica Freschi, G. Giacinto, F. Roli","doi":"10.1109/ARES.2015.87","DOIUrl":"https://doi.org/10.1109/ARES.2015.87","url":null,"abstract":"In this paper we describe the road mapping methodology we developed in the context of the CyberROAD EU FP7 project, whose aim is to develop a research roadmap for cybercrime and cyber terrorism. To this aim we built on state-of-the-art methodologies and available guidelines, including related projects, and adapted them to the peculiarities of our road mapping subject. In particular, its distinctive feature is that cybercrime and cyber terrorism co-evolve with their contextual environment (i.e., Technology, society, politics and economy), which poses specific challenges to a road mapping effort. Our approach can become a best practice in the field of cyber security, and can be also generalised to phenomena that exhibit a similar, strong co-evolution with their contextual environment. We aim to describe here the road mapping methodology that will lead to the roadmap but not the roadmap itself (this one being, incidentally, still under construction at the time of writing this paper).","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116545249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0-Day Vulnerabilities and Cybercrime 零日漏洞和网络犯罪
J. Armin, P. Foti, M. Cremonini
This study analyzes 0-day vulnerabilities in the broader context of cybercrime and economic markets. The work is based on the interviews of several leading experts and on a field research of the authors. In particular, cybercrime is considered when involving traditional criminal activities or when military operations are involved. A description of different 0-day vulnerability markets - White, Black and Government markets - is provided, as well as the characteristics of malware factories and their major customers are discussed.
本研究在更广泛的网络犯罪和经济市场背景下分析了零日漏洞。这项工作是基于几位主要专家的访谈和作者的实地研究。特别是,当涉及传统犯罪活动或涉及军事行动时,就会考虑网络犯罪。本文描述了不同的零日漏洞市场——白色、黑色和政府市场,并讨论了恶意软件工厂及其主要客户的特点。
{"title":"0-Day Vulnerabilities and Cybercrime","authors":"J. Armin, P. Foti, M. Cremonini","doi":"10.1109/ARES.2015.55","DOIUrl":"https://doi.org/10.1109/ARES.2015.55","url":null,"abstract":"This study analyzes 0-day vulnerabilities in the broader context of cybercrime and economic markets. The work is based on the interviews of several leading experts and on a field research of the authors. In particular, cybercrime is considered when involving traditional criminal activities or when military operations are involved. A description of different 0-day vulnerability markets - White, Black and Government markets - is provided, as well as the characteristics of malware factories and their major customers are discussed.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115788340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Abuse Detection and Prevention in IaaS Cloud Computing IaaS云计算中的滥用检测与预防
Jens Lindemann
Cloud computing is frequently being used to host online services. Abuse of cloud resources poses an important problem for cloud service providers. If third parties are affected by abuse, bad publicity or legal liabilities may ensue for the provider. There is an unsatisfactory level of protection against abuse of cloud offerings at the moment. In this paper, we analyse the current state of abuse detection and prevention in IaaS cloud computing. To establish what constitutes abuse in an IaaS environment, a survey of acceptable use policies of cloud service providers was conducted. We have found that existing intrusion detection and prevention techniques are only of limited use in this environment due to the high level of control that users can exercise over their resources. However, cloud computing opens up different opportunities for intrusion detection. We present possible approaches for abuse detection, which we plan to investigate further in future work.
云计算经常被用于托管在线服务。云资源的滥用是云服务提供商面临的一个重要问题。如果第三方受到滥用的影响,提供商可能会面临不良宣传或法律责任。目前,针对云产品滥用的保护水平还不能令人满意。本文分析了IaaS云计算中滥用检测和预防的现状。为了确定在IaaS环境中什么构成滥用,对云服务提供商的可接受使用政策进行了调查。我们发现,现有的入侵检测和防御技术在这种环境中只有有限的用途,因为用户可以对其资源进行高度控制。然而,云计算为入侵检测提供了不同的机会。我们提出了可能的滥用检测方法,我们计划在未来的工作中进一步研究。
{"title":"Towards Abuse Detection and Prevention in IaaS Cloud Computing","authors":"Jens Lindemann","doi":"10.1109/ARES.2015.72","DOIUrl":"https://doi.org/10.1109/ARES.2015.72","url":null,"abstract":"Cloud computing is frequently being used to host online services. Abuse of cloud resources poses an important problem for cloud service providers. If third parties are affected by abuse, bad publicity or legal liabilities may ensue for the provider. There is an unsatisfactory level of protection against abuse of cloud offerings at the moment. In this paper, we analyse the current state of abuse detection and prevention in IaaS cloud computing. To establish what constitutes abuse in an IaaS environment, a survey of acceptable use policies of cloud service providers was conducted. We have found that existing intrusion detection and prevention techniques are only of limited use in this environment due to the high level of control that users can exercise over their resources. However, cloud computing opens up different opportunities for intrusion detection. We present possible approaches for abuse detection, which we plan to investigate further in future work.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Towards Black Box Testing of Android Apps Android应用的黑盒测试
Yury Zhauniarovich, A. Philippov, O. Gadyatskaya, B. Crispo, F. Massacci
Many state-of-art mobile application testing frameworks (e.g., Dynodroid [1], EvoDroid [2]) enjoy Emma [3] or other code coverage libraries to measure the coverage achieved. The underlying assumption for these frameworks is availability of the app source code. Yet, application markets and security researchers face the need to test third-party mobile applications in the absence of the source code. There exists a number of frameworks both for manual and automated test generation that address this challenge. However, these frameworks often do not provide any statistics on the code coverage achieved, or provide coarse-grained ones like a number of activities or methods covered. At the same time, given two test reports generated by different frameworks, there is no way to understand which one achieved better coverage if the reported metrics were different (or no coverage results were provided). To address these issues we designed a framework called BBOXTESTER that is able to generate code coverage reports and produce uniform coverage metrics in testing without the source code. Security researchers can automatically execute applications exploiting current state-of-art tools, and use the results of our framework to assess if the security-critical code was covered by the tests. In this paper we report on design and implementation of BBOXTESTER and assess its efficiency and effectiveness.
许多最先进的移动应用测试框架(例如,Dynodroid [1], EvoDroid[2])都使用Emma[3]或其他代码覆盖库来衡量实现的覆盖率。这些框架的基本假设是应用程序源代码的可用性。然而,应用程序市场和安全研究人员需要在没有源代码的情况下测试第三方移动应用程序。存在许多用于手动和自动生成测试的框架来解决这一挑战。然而,这些框架通常不提供任何关于代码覆盖率的统计数据,或者提供粗粒度的统计数据,比如所覆盖的活动或方法的数量。同时,给定由不同框架生成的两个测试报告,如果报告的量度不同(或者没有提供覆盖结果),就没有办法理解哪一个获得了更好的覆盖。为了解决这些问题,我们设计了一个名为BBOXTESTER的框架,它能够在没有源代码的情况下生成代码覆盖率报告并在测试中生成统一的覆盖率指标。安全研究人员可以利用当前最先进的工具自动执行应用程序,并使用我们的框架的结果来评估测试是否涵盖了安全关键代码。本文报告了BBOXTESTER的设计和实现,并对其效率和有效性进行了评估。
{"title":"Towards Black Box Testing of Android Apps","authors":"Yury Zhauniarovich, A. Philippov, O. Gadyatskaya, B. Crispo, F. Massacci","doi":"10.1109/ARES.2015.70","DOIUrl":"https://doi.org/10.1109/ARES.2015.70","url":null,"abstract":"Many state-of-art mobile application testing frameworks (e.g., Dynodroid [1], EvoDroid [2]) enjoy Emma [3] or other code coverage libraries to measure the coverage achieved. The underlying assumption for these frameworks is availability of the app source code. Yet, application markets and security researchers face the need to test third-party mobile applications in the absence of the source code. There exists a number of frameworks both for manual and automated test generation that address this challenge. However, these frameworks often do not provide any statistics on the code coverage achieved, or provide coarse-grained ones like a number of activities or methods covered. At the same time, given two test reports generated by different frameworks, there is no way to understand which one achieved better coverage if the reported metrics were different (or no coverage results were provided). To address these issues we designed a framework called BBOXTESTER that is able to generate code coverage reports and produce uniform coverage metrics in testing without the source code. Security researchers can automatically execute applications exploiting current state-of-art tools, and use the results of our framework to assess if the security-critical code was covered by the tests. In this paper we report on design and implementation of BBOXTESTER and assess its efficiency and effectiveness.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122334793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Network Security Challenges in Android Applications Android应用中的网络安全挑战
D. Buhov, Markus Huber, Georg Merzdovnik, E. Weippl, V. Dimitrova
The digital world is in constant battle for improvement - especially in the security field. Taking into consideration the revelations from Edward Snowden about the mass surveillance programs conducted by governmental authorities, the number of users that raised awareness towards security is constantly increasing. More and more users agree that additional steps must be taken to ensure the fact that communication will remain private as intended in the first place. Taking in consideration the ongoing transition in the digital world, there are already more mobile phones than people on this planet. According to recent statistics there are around 7 billion active cell phones by 2014 out of which nearly 2 billion are smartphones. The use of smartphones by itself could open a great security hole. The most common problem when it comes to Android applications is the common misuse of the HTTPS protocol. Having this in mind, this paper addresses the current issues when it comes to misuse of the HTTPS protocol and proposes possible solutions to overcome this common problem. In this paper we evaluate the SSL implementation in a recent set of Android applications and present some of the most common missuses. The goal of this paper is to raise awareness to current and new developers to actually consider security as one of their main goals during the development life cycle of applications.
数字世界一直在为改进而战,尤其是在安全领域。考虑到爱德华·斯诺登(Edward Snowden)披露的政府当局大规模监控项目,提高安全意识的用户数量不断增加。越来越多的用户同意,必须采取额外的措施,以确保通信的私密性,就像最初预期的那样。考虑到数字世界正在进行的转型,这个星球上的手机数量已经超过了人口数量。根据最近的统计数据,到2014年,全球约有70亿部手机在使用,其中近20亿是智能手机。智能手机本身的使用可能会打开一个巨大的安全漏洞。当涉及到Android应用程序时,最常见的问题是HTTPS协议的常见滥用。考虑到这一点,本文解决了当前滥用HTTPS协议的问题,并提出了克服这一常见问题的可能解决方案。在本文中,我们评估了最近一组Android应用程序中的SSL实现,并提出了一些最常见的错误。本文的目标是提高当前和新开发人员的意识,让他们在应用程序的开发生命周期中将安全性作为主要目标之一。
{"title":"Network Security Challenges in Android Applications","authors":"D. Buhov, Markus Huber, Georg Merzdovnik, E. Weippl, V. Dimitrova","doi":"10.1109/ARES.2015.59","DOIUrl":"https://doi.org/10.1109/ARES.2015.59","url":null,"abstract":"The digital world is in constant battle for improvement - especially in the security field. Taking into consideration the revelations from Edward Snowden about the mass surveillance programs conducted by governmental authorities, the number of users that raised awareness towards security is constantly increasing. More and more users agree that additional steps must be taken to ensure the fact that communication will remain private as intended in the first place. Taking in consideration the ongoing transition in the digital world, there are already more mobile phones than people on this planet. According to recent statistics there are around 7 billion active cell phones by 2014 out of which nearly 2 billion are smartphones. The use of smartphones by itself could open a great security hole. The most common problem when it comes to Android applications is the common misuse of the HTTPS protocol. Having this in mind, this paper addresses the current issues when it comes to misuse of the HTTPS protocol and proposes possible solutions to overcome this common problem. In this paper we evaluate the SSL implementation in a recent set of Android applications and present some of the most common missuses. The goal of this paper is to raise awareness to current and new developers to actually consider security as one of their main goals during the development life cycle of applications.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
AnonCall: Making Anonymous Cellular Phone Calls AnonCall:拨打匿名手机电话
Eric Chan-Tin
The threat of mass surveillance and the need for privacy have become mainstream recently. Most of the anonymity schemes have focused on Internet privacy. We propose an anonymity scheme for cellular phone calls. The cellular phones form an ad-hoc network relaying phone conversations through direct wifi connections. A proof-of-concept implementation on an Android smartphone is completed and shown to work with minimal delay in communications.
最近,大规模监控的威胁和对隐私的需求已经成为主流。大多数匿名方案都侧重于互联网隐私。我们提出了一个手机通话匿名方案。移动电话通过直接的wifi连接形成了一个特别的网络来传递电话对话。在Android智能手机上完成了概念验证实现,并展示了以最小的通信延迟工作。
{"title":"AnonCall: Making Anonymous Cellular Phone Calls","authors":"Eric Chan-Tin","doi":"10.1109/ARES.2015.13","DOIUrl":"https://doi.org/10.1109/ARES.2015.13","url":null,"abstract":"The threat of mass surveillance and the need for privacy have become mainstream recently. Most of the anonymity schemes have focused on Internet privacy. We propose an anonymity scheme for cellular phone calls. The cellular phones form an ad-hoc network relaying phone conversations through direct wifi connections. A proof-of-concept implementation on an Android smartphone is completed and shown to work with minimal delay in communications.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not? 加强国家对电子通信的监控:解决极端主义的法律解决方案与否?
M. Watney
Extremism appears to be on the increase. Electronic communication reaches countless people across borders, canvassing support for radical views and/or inciting hatred and/or violence. This legal discussion deals with many inter-related questions that are of global relevance as electronic communication permeates our lives. Should a government tighten surveillance of electronic communication to combat and/or detect extremism or does such information gathering practices violate the user's right to freedom of expression and privacy? Should government agencies carry out the surveillance or should the ISP as provider of access and/or hosting of information gather information on extremist communication? Will the aftermath of the 2013 Snowden revelations of unwarranted, general and bulk state surveillance result in governments being wary to tighten state surveillance powers or has the level of extremism reached such a degree that it warrants governments to focus on monitoring as a surveillance method counteracting radicalism that may endanger the safety and security of a country. Tension between human rights protection and government use of surveillance powers is unavoidable as some argue that security and safety factors are exaggerated to justify extension of state surveillance powers, however the evidence of extremism unfortunately speaks for itself. This discussion provides an overview of the approach to surveillance a government may apply to online extremism.
极端主义似乎在增加。电子通讯跨越国界触及无数人,为激进观点拉票和/或煽动仇恨和/或暴力。这一法律讨论涉及许多相互关联的问题,这些问题具有全球相关性,因为电子通信渗透到我们的生活中。政府是否应该加强对电子通讯的监控,以打击和/或侦查极端主义,或者这种信息收集行为是否侵犯了用户的言论自由和隐私权?政府机构是否应该进行监视,或者作为访问和/或托管信息的提供商是否应该收集极端主义通信的信息?2013年斯诺登(Snowden)披露的未经授权的、广泛的、大规模的国家监控的后果,是否会导致政府对加强国家监控权力持谨慎态度,或者极端主义的程度是否已经达到如此程度,以至于政府有理由将监控作为一种监控方法,来对抗可能危及国家安全的激进主义?人权保护和政府使用监视权力之间的紧张关系是不可避免的,因为一些人认为,安全和安全因素被夸大,以证明国家监视权力的延伸,但不幸的是,极端主义的证据不言自明。本讨论概述了政府对网络极端主义可能采用的监控方法。
{"title":"Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not?","authors":"M. Watney","doi":"10.1109/ARES.2015.51","DOIUrl":"https://doi.org/10.1109/ARES.2015.51","url":null,"abstract":"Extremism appears to be on the increase. Electronic communication reaches countless people across borders, canvassing support for radical views and/or inciting hatred and/or violence. This legal discussion deals with many inter-related questions that are of global relevance as electronic communication permeates our lives. Should a government tighten surveillance of electronic communication to combat and/or detect extremism or does such information gathering practices violate the user's right to freedom of expression and privacy? Should government agencies carry out the surveillance or should the ISP as provider of access and/or hosting of information gather information on extremist communication? Will the aftermath of the 2013 Snowden revelations of unwarranted, general and bulk state surveillance result in governments being wary to tighten state surveillance powers or has the level of extremism reached such a degree that it warrants governments to focus on monitoring as a surveillance method counteracting radicalism that may endanger the safety and security of a country. Tension between human rights protection and government use of surveillance powers is unavoidable as some argue that security and safety factors are exaggerated to justify extension of state surveillance powers, however the evidence of extremism unfortunately speaks for itself. This discussion provides an overview of the approach to surveillance a government may apply to online extremism.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"29 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114007276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Uncovering Use-After-Free Conditions in Compiled Code 揭示编译后代码中的Use-After-Free条件
David Dewey, Bradley Reaves, Patrick Traynor
Use-after-free conditions occur when an execution path of a process accesses an incorrectly deal located object. Such access is problematic because it may potentially allow for the execution of arbitrary code by an adversary. However, while increasingly common, such flaws are rarely detected by compilers in even the most obvious instances. In this paper, we design and implement a static analysis method for the detection of use-after-free conditions in binary code. Our new analysis is similar to available expression analysis and traverses all code paths to ensure that every object is defined before each use. Failure to achieve this property indicates that an object is improperly freed and potentially vulnerable to compromise. After discussing the details of our algorithm, we implement a tool and run it against a set of enterprise-grade, publicly available binaries. We show that our tool can not only catch textbook and recently released in-situ examples of this flaw, but that it has also identified 127 additional use-after-free conditions in a search of 652 compiled binaries in the Windows system32 directory. In so doing, we demonstrate not only the power of this approach in combating this increasingly common vulnerability, but also the ability to identify such problems in software for which the source code is not necessarily publicly available.
当进程的执行路径访问错误定位的处理对象时,就会出现Use-after-free条件。这种访问是有问题的,因为它可能允许攻击者执行任意代码。然而,尽管这种缺陷越来越普遍,但即使在最明显的情况下,编译器也很少检测到这种缺陷。本文设计并实现了一种静态分析方法,用于检测二进制代码中自由后使用的条件。我们的新分析类似于可用表达式分析,并遍历所有代码路径,以确保在每次使用之前定义每个对象。未能实现此属性表明对象未被正确释放,并且可能容易受到损害。在讨论了算法的细节之后,我们实现了一个工具,并在一组公开可用的企业级二进制文件上运行它。我们表明,我们的工具不仅可以捕获教科书和最近发布的此漏洞的原位示例,而且还可以在搜索Windows system32目录下的652个编译二进制文件时发现127个额外的use-after-free条件。在这样做的过程中,我们不仅展示了这种方法在对抗这种日益常见的漏洞方面的强大功能,而且还展示了在源代码不一定公开的软件中识别此类问题的能力。
{"title":"Uncovering Use-After-Free Conditions in Compiled Code","authors":"David Dewey, Bradley Reaves, Patrick Traynor","doi":"10.1109/ARES.2015.61","DOIUrl":"https://doi.org/10.1109/ARES.2015.61","url":null,"abstract":"Use-after-free conditions occur when an execution path of a process accesses an incorrectly deal located object. Such access is problematic because it may potentially allow for the execution of arbitrary code by an adversary. However, while increasingly common, such flaws are rarely detected by compilers in even the most obvious instances. In this paper, we design and implement a static analysis method for the detection of use-after-free conditions in binary code. Our new analysis is similar to available expression analysis and traverses all code paths to ensure that every object is defined before each use. Failure to achieve this property indicates that an object is improperly freed and potentially vulnerable to compromise. After discussing the details of our algorithm, we implement a tool and run it against a set of enterprise-grade, publicly available binaries. We show that our tool can not only catch textbook and recently released in-situ examples of this flaw, but that it has also identified 127 additional use-after-free conditions in a search of 652 compiled binaries in the Windows system32 directory. In so doing, we demonstrate not only the power of this approach in combating this increasingly common vulnerability, but also the ability to identify such problems in software for which the source code is not necessarily publicly available.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
QR Code Security -- How Secure and Usable Apps Can Protect Users Against Malicious QR Codes QR码安全-如何安全可用的应用程序可以保护用户免受恶意QR码
Katharina Krombholz, P. Frühwirt, T. Rieder, Ioannis Kapsalis, Johanna Ullrich, E. Weippl
QR codes have emerged as a popular medium to make content instantly accessible. With their high information density and robust error correction, they have found their way to the mobile ecosystem. However, QR codes have also proven to be an efficient attack vector, e.g. To perform phishing attacks. Attackers distribute malicious codes under false pretenses in busy places or paste malicious QR codes over already existing ones on billboards. Ultimately, people depend on reader software to ascertain if a given QR code is benign or malicious. In this paper, we present a comprehensive analysis of QR code security. We determine why users are still susceptible to QR code based attacks and why currently deployed smartphone apps are unable to mitigate these attacks. Based on our findings, we present a set of design recommendations to build usable and secure mobile applications. To evaluate our guidelines, we implemented a prototype and found that secure and usable apps can effectively protect users from malicious QR codes.
QR码已经成为一种流行的媒介,可以使内容即时访问。凭借其高信息密度和强大的纠错功能,它们已经在移动生态系统中找到了自己的道路。然而,QR码也被证明是一种有效的攻击媒介,例如执行网络钓鱼攻击。攻击者在繁忙的场所假借恶意代码散布恶意代码,或者在广告牌上粘贴恶意二维码。最终,人们依靠阅读器软件来确定给定的QR码是良性的还是恶意的。本文对二维码的安全性进行了全面的分析。我们确定了为什么用户仍然容易受到基于QR码的攻击,以及为什么目前部署的智能手机应用程序无法减轻这些攻击。基于我们的发现,我们提出了一组设计建议,以构建可用且安全的移动应用程序。为了评估我们的指导方针,我们实现了一个原型,发现安全可用的应用程序可以有效地保护用户免受恶意QR码的侵害。
{"title":"QR Code Security -- How Secure and Usable Apps Can Protect Users Against Malicious QR Codes","authors":"Katharina Krombholz, P. Frühwirt, T. Rieder, Ioannis Kapsalis, Johanna Ullrich, E. Weippl","doi":"10.1109/ARES.2015.84","DOIUrl":"https://doi.org/10.1109/ARES.2015.84","url":null,"abstract":"QR codes have emerged as a popular medium to make content instantly accessible. With their high information density and robust error correction, they have found their way to the mobile ecosystem. However, QR codes have also proven to be an efficient attack vector, e.g. To perform phishing attacks. Attackers distribute malicious codes under false pretenses in busy places or paste malicious QR codes over already existing ones on billboards. Ultimately, people depend on reader software to ascertain if a given QR code is benign or malicious. In this paper, we present a comprehensive analysis of QR code security. We determine why users are still susceptible to QR code based attacks and why currently deployed smartphone apps are unable to mitigate these attacks. Based on our findings, we present a set of design recommendations to build usable and secure mobile applications. To evaluate our guidelines, we implemented a prototype and found that secure and usable apps can effectively protect users from malicious QR codes.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment MANET环境下基于信任管理的安全方案规范与验证模型
Aida Ben Chehida Douss, Ryma Abassi, S. Fatmi
Recently, we proposed a reputation based trust management scheme built upon a Mobility-based Clustering Approach (MCA) organizing Mobile Ad hoc Network MANET and detecting and isolating malicious behaviors. The whole scheme was called TMCA (Trust based MCA) and was extended in a second time with a delegation process resulting a proposition baptized DTMCA (Delegation TMCA based process). However, deploying such scheme is error prone and it appears necessary to validate it before its real implementation. In fact, scheme specification and validation constitute two fundamental challenges in the development of secure communication systems ensuring that the scheme is correctly enforced and complete. Hence, the main contribution of this paper concerns a validation framework for DTMCA scheme. The first step towards validation process is its formal specification. This is our first concern in this paper: a formal specification language called SCMSL (Secured Clustered MANET Specification Language) defined through a syntax based on authorization and obligation rules and a clear semantics. The second part of this paper proves the two major characteristics that must be guaranteed in such case: consistency and completeness. Consistency is proved by showing that there is no conflict in our scheme whereas completeness is proved by assessing that all potential situations are handled. The proof of consistency and completeness is made using automated systems through the definition of adequate algorithms.
最近,我们提出了一种基于声誉的信任管理方案,该方案基于基于移动性的聚类方法(MCA)来组织移动自组网MANET并检测和隔离恶意行为。整个方案被称为TMCA(基于信任的MCA),并在第二次扩展了一个委托过程,产生了一个命名为DTMCA(基于委托的TMCA过程)的提议。然而,部署这样的方案是容易出错的,在真正实现之前对其进行验证似乎是必要的。事实上,方案规范和验证构成了安全通信系统开发中的两个基本挑战,以确保方案的正确执行和完整。因此,本文的主要贡献在于DTMCA方案的验证框架。验证过程的第一步是它的正式规范。这是我们在本文中首先关注的问题:一种称为SCMSL(安全集群MANET规范语言)的正式规范语言,它通过基于授权和义务规则的语法以及清晰的语义来定义。本文的第二部分证明了在这种情况下必须保证的两个主要特征:一致性和完备性。一致性是通过证明我们的方案中没有冲突来证明的,而完整性是通过评估所有可能的情况都被处理来证明的。一致性和完备性的证明是通过定义适当的算法来使用自动化系统进行的。
{"title":"A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment","authors":"Aida Ben Chehida Douss, Ryma Abassi, S. Fatmi","doi":"10.1109/ARES.2015.92","DOIUrl":"https://doi.org/10.1109/ARES.2015.92","url":null,"abstract":"Recently, we proposed a reputation based trust management scheme built upon a Mobility-based Clustering Approach (MCA) organizing Mobile Ad hoc Network MANET and detecting and isolating malicious behaviors. The whole scheme was called TMCA (Trust based MCA) and was extended in a second time with a delegation process resulting a proposition baptized DTMCA (Delegation TMCA based process). However, deploying such scheme is error prone and it appears necessary to validate it before its real implementation. In fact, scheme specification and validation constitute two fundamental challenges in the development of secure communication systems ensuring that the scheme is correctly enforced and complete. Hence, the main contribution of this paper concerns a validation framework for DTMCA scheme. The first step towards validation process is its formal specification. This is our first concern in this paper: a formal specification language called SCMSL (Secured Clustered MANET Specification Language) defined through a syntax based on authorization and obligation rules and a clear semantics. The second part of this paper proves the two major characteristics that must be guaranteed in such case: consistency and completeness. Consistency is proved by showing that there is no conflict in our scheme whereas completeness is proved by assessing that all potential situations are handled. The proof of consistency and completeness is made using automated systems through the definition of adequate algorithms.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 10th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1