首页 > 最新文献

Proceedings of the 31st Annual Computer Security Applications Conference最新文献

英文 中文
MobiPluto: File System Friendly Deniable Storage for Mobile Devices MobiPluto:移动设备的文件系统友好的可否认存储
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818046
Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang
Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may always feel reluctant to expose this type of data to undesired observers or inspectors. This usually can be achieved by encryption. However, the traditional encryption may not work when an adversary is able to coerce device owners into revealing their encrypted content. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this type of powerful adversaries. In this paper, we present MobiPluto, a file system friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. MobiPluto achieves deniability feature as nothing but a "side-effect" of combining thin provisioning, a well-established tool in Linux kernel, with encryption. This feature makes MobiPluto more plausible for users to have such software on their mobile devices. A salient difference between MobiPluto and the existing PDE schemes is that MobiPluto is "file system friendly", i.e., any block-based file systems can be deployed on top of it. Thus, it is possible to deploy MobiPluto on most mobile devices. We provide a proof-of-concept implementation for MobiPluto in an Android phone to assess its feasibility and performance.
移动设备普遍用于处理个人隐私数据,有时还用于收集社会不公正或政治压迫的证据。设备所有者可能总是不愿意将这类数据暴露给不需要的观察者或检查人员。这通常可以通过加密来实现。然而,当攻击者能够强迫设备所有者泄露其加密内容时,传统的加密可能就不起作用了。因此,合理可否认加密(PDE)被设计用于保护敏感数据免受这类强大对手的攻击。在本文中,我们提出了MobiPluto,一个文件系统友好的PDE方案,用于否认存储在移动设备上的敏感数据的存在。MobiPluto实现的可否认特性只不过是将瘦配置(Linux内核中一个成熟的工具)与加密相结合的“副作用”。这个特性使得MobiPluto更适合用户在他们的移动设备上安装这样的软件。MobiPluto与现有PDE方案之间的一个显著区别是,MobiPluto是“文件系统友好的”,即任何基于块的文件系统都可以部署在其上。因此,可以在大多数移动设备上部署MobiPluto。我们提供了MobiPluto在Android手机上的概念验证实现,以评估其可行性和性能。
{"title":"MobiPluto: File System Friendly Deniable Storage for Mobile Devices","authors":"Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang","doi":"10.1145/2818000.2818046","DOIUrl":"https://doi.org/10.1145/2818000.2818046","url":null,"abstract":"Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may always feel reluctant to expose this type of data to undesired observers or inspectors. This usually can be achieved by encryption. However, the traditional encryption may not work when an adversary is able to coerce device owners into revealing their encrypted content. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this type of powerful adversaries. In this paper, we present MobiPluto, a file system friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. MobiPluto achieves deniability feature as nothing but a \"side-effect\" of combining thin provisioning, a well-established tool in Linux kernel, with encryption. This feature makes MobiPluto more plausible for users to have such software on their mobile devices. A salient difference between MobiPluto and the existing PDE schemes is that MobiPluto is \"file system friendly\", i.e., any block-based file systems can be deployed on top of it. Thus, it is possible to deploy MobiPluto on most mobile devices. We provide a proof-of-concept implementation for MobiPluto in an Android phone to assess its feasibility and performance.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices 防止对移动设备音频通道的攻击
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818005
Giuseppe Petracca, Yuqiong Sun, T. Jaeger, Ahmad Atamli-Reineh
Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical information. Contemporary mobile operating systems fail to prevent such attacks because they do not control access to the speaker at all and fail to control when untrusted apps may use the microphone, enabling authorized apps to create exploitable communication channels. In this paper, we propose a security mechanism that tracks the creation of audio communication channels explicitly and controls the information flows over these channels to prevent several types of attacks. We design and implement AuDroid, an extension to the SE Linux reference monitor integrated into the Android operating system for enforcing lattice security policies over the dynamically changing use of system audio resources. To enhance flexibility, when information flow errors are detected, the device owner, system apps and services are given the opportunity to resolve information flow errors using known methods, enabling AuDroid to run many configurations safely. We evaluate our approach on 17 widely-used apps that make extensive use of the microphone and speaker, finding that AuDroid prevents six types of attack scenarios on audio channels while permitting all 17 apps to run effectively. AuDroid shows that it is possible to prevent attacks using audio channels without compromising functionality or introducing significant performance overhead.
语音控制是操作移动设备的一种流行方式,使用户能够向他们的设备发送请求。然而,攻击者可以利用语音控制欺骗移动设备执行命令来泄露机密或修改关键信息。当前的移动操作系统无法阻止此类攻击,因为它们根本无法控制对扬声器的访问,也无法控制不受信任的应用程序何时可能使用麦克风,从而使授权的应用程序能够创建可利用的通信渠道。在本文中,我们提出了一种安全机制,该机制明确地跟踪音频通信通道的创建并控制这些通道上的信息流,以防止几种类型的攻击。我们设计并实现了AuDroid,这是一个SE Linux参考监视器的扩展,集成到Android操作系统中,用于在动态变化的系统音频资源使用上执行点阵安全策略。为了提高灵活性,当检测到信息流错误时,设备所有者、系统应用程序和服务都有机会使用已知的方法解决信息流错误,从而使AuDroid能够安全地运行许多配置。我们对17个广泛使用麦克风和扬声器的应用程序进行了评估,发现AuDroid在允许所有17个应用程序有效运行的同时,可以防止6种类型的音频通道攻击。AuDroid表明,可以在不损害功能或引入显著性能开销的情况下使用音频通道来防止攻击。
{"title":"AuDroid: Preventing Attacks on Audio Channels in Mobile Devices","authors":"Giuseppe Petracca, Yuqiong Sun, T. Jaeger, Ahmad Atamli-Reineh","doi":"10.1145/2818000.2818005","DOIUrl":"https://doi.org/10.1145/2818000.2818005","url":null,"abstract":"Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical information. Contemporary mobile operating systems fail to prevent such attacks because they do not control access to the speaker at all and fail to control when untrusted apps may use the microphone, enabling authorized apps to create exploitable communication channels. In this paper, we propose a security mechanism that tracks the creation of audio communication channels explicitly and controls the information flows over these channels to prevent several types of attacks. We design and implement AuDroid, an extension to the SE Linux reference monitor integrated into the Android operating system for enforcing lattice security policies over the dynamically changing use of system audio resources. To enhance flexibility, when information flow errors are detected, the device owner, system apps and services are given the opportunity to resolve information flow errors using known methods, enabling AuDroid to run many configurations safely. We evaluate our approach on 17 widely-used apps that make extensive use of the microphone and speaker, finding that AuDroid prevents six types of attack scenarios on audio channels while permitting all 17 apps to run effectively. AuDroid shows that it is possible to prevent attacks using audio channels without compromising functionality or introducing significant performance overhead.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
MOSE: Live Migration Based On-the-Fly Software Emulation MOSE:基于实时软件仿真的实时迁移
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818022
Jinpeng Wei, Lok K. Yan, M. A. Hakim
Software emulation has been proven useful in many scenarios, such as software testing, malware analysis, and intrusion response. However, fine-grained software emulation (e.g., at the instruction level) incurs considerable execution overhead (about 8x performance degradation), which hampers its use in production settings. In this paper, we propose MOSE (Live Migration based On-the-fly Software Emulation) that combines the performance advantages of hardware virtualization and the fine-grained analysis capability (comprehensiveness) of whole-system software emulation. Namely, a system can run as normal on a hardware-virtualized platform at near native speed, but when needed, it can be live-migrated to an emulator, not necessarily running on the same physical system, for in-depth analysis and triage; when the analysis is complete, the virtual machine can be migrated back to benefit from full hardware-virtualization again. In this way, the performance degradation is only experienced during analysis and triage. To demonstrate this new capability, we built a proof of concept on-the-fly software emulation system, based on QEMU/KVM and DECAF, the Dynamic Executable Code Analysis Framework. We also perform three case studies: automated kernel panic triage, live-patching a security vulnerability, and on-demand symbolic execution, to illustrate on-demand instruction level analysis.
软件仿真已被证明在许多场景中都很有用,例如软件测试、恶意软件分析和入侵响应。然而,细粒度的软件模拟(例如,在指令级)会导致相当大的执行开销(大约8倍的性能下降),这阻碍了它在生产环境中的使用。在本文中,我们提出了MOSE(基于实时迁移的实时软件仿真),它结合了硬件虚拟化的性能优势和全系统软件仿真的细粒度分析能力(全面性)。也就是说,系统可以在硬件虚拟化平台上以接近本机的速度正常运行,但在需要时,它可以实时迁移到模拟器上,而不一定在同一物理系统上运行,以便进行深入分析和分类;当分析完成后,可以将虚拟机迁移回来,再次从完全硬件虚拟化中获益。这样,性能下降只会在分析和分类期间出现。为了演示这个新功能,我们基于QEMU/KVM和DECAF(动态可执行代码分析框架)构建了一个概念验证的实时软件仿真系统。我们还执行了三个案例研究:自动内核恐慌分类、实时修补安全漏洞和按需符号执行,以说明按需指令级分析。
{"title":"MOSE: Live Migration Based On-the-Fly Software Emulation","authors":"Jinpeng Wei, Lok K. Yan, M. A. Hakim","doi":"10.1145/2818000.2818022","DOIUrl":"https://doi.org/10.1145/2818000.2818022","url":null,"abstract":"Software emulation has been proven useful in many scenarios, such as software testing, malware analysis, and intrusion response. However, fine-grained software emulation (e.g., at the instruction level) incurs considerable execution overhead (about 8x performance degradation), which hampers its use in production settings. In this paper, we propose MOSE (Live Migration based On-the-fly Software Emulation) that combines the performance advantages of hardware virtualization and the fine-grained analysis capability (comprehensiveness) of whole-system software emulation. Namely, a system can run as normal on a hardware-virtualized platform at near native speed, but when needed, it can be live-migrated to an emulator, not necessarily running on the same physical system, for in-depth analysis and triage; when the analysis is complete, the virtual machine can be migrated back to benefit from full hardware-virtualization again. In this way, the performance degradation is only experienced during analysis and triage. To demonstrate this new capability, we built a proof of concept on-the-fly software emulation system, based on QEMU/KVM and DECAF, the Dynamic Executable Code Analysis Framework. We also perform three case studies: automated kernel panic triage, live-patching a security vulnerability, and on-demand symbolic execution, to illustrate on-demand instruction level analysis.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133228147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage ErsatzPasswords:结束密码破解和检测密码泄露
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818015
Mohammed H. Almeshekah, Christopher N. Gutierrez, M. Atallah, E. Spafford
In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at the same time. We utilize a machine-dependent function, such as a physically unclonable function (PUF) or a hardware security module (HSM) at the authentication server to prevent off-site password discovery, and a deception mechanism to alert us if such an action is attempted. Our scheme can be easily integrated with legacy systems without the need of any additional servers, changing the structure of the hashed password file or any client modifications. When using the scheme the structure of the hashed passwords file, etc/shadow or etc/master.passwd, will appear no different than in the traditional scheme.1 However, when an attacker exfiltrates the hashed passwords file and tries to crack it, the only passwords he will get are the ersatzpasswords --- the "fake passwords". When an attempt to login using these ersatzpasswords is detected an alarm will be triggered in the system. Even with an adversary who knows about the scheme, cracking cannot be launched without physical access to the authentication server. The scheme also includes a secure backup mechanism in the event of a failure of the hardware dependent function. We discuss our implementation and provide some discussion in comparison to the traditional authentication scheme.
在这项工作中,我们提出了一个简单,但有效和实用的方案,以提高存储密码哈希的安全性,同时使其破解可检测和不可克服。我们利用与机器相关的功能,例如身份验证服务器上的物理不可克隆功能(PUF)或硬件安全模块(HSM)来防止场外密码发现,并利用欺骗机制在尝试此类操作时向我们发出警报。我们的方案可以很容易地与遗留系统集成,而不需要任何额外的服务器,更改散列密码文件的结构或任何客户端修改。当使用该方案时,散列密码文件的结构,etc/shadow或etc/master。Passwd,将出现与传统方案没有什么不同然而,当攻击者泄漏散列密码文件并试图破解它时,他将获得的唯一密码是假密码——“假密码”。当检测到试图使用这些假密码登录时,系统将触发告警。即使对手知道该方案,如果没有对身份验证服务器的物理访问,也无法启动破解。该方案还包括在硬件相关功能发生故障时的安全备份机制。我们讨论了我们的实现,并提供了一些与传统身份验证方案比较的讨论。
{"title":"ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage","authors":"Mohammed H. Almeshekah, Christopher N. Gutierrez, M. Atallah, E. Spafford","doi":"10.1145/2818000.2818015","DOIUrl":"https://doi.org/10.1145/2818000.2818015","url":null,"abstract":"In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at the same time. We utilize a machine-dependent function, such as a physically unclonable function (PUF) or a hardware security module (HSM) at the authentication server to prevent off-site password discovery, and a deception mechanism to alert us if such an action is attempted. Our scheme can be easily integrated with legacy systems without the need of any additional servers, changing the structure of the hashed password file or any client modifications. When using the scheme the structure of the hashed passwords file, etc/shadow or etc/master.passwd, will appear no different than in the traditional scheme.1 However, when an attacker exfiltrates the hashed passwords file and tries to crack it, the only passwords he will get are the ersatzpasswords --- the \"fake passwords\". When an attempt to login using these ersatzpasswords is detected an alarm will be triggered in the system. Even with an adversary who knows about the scheme, cracking cannot be launched without physical access to the authentication server. The scheme also includes a secure backup mechanism in the event of a failure of the hardware dependent function. We discuss our implementation and provide some discussion in comparison to the traditional authentication scheme.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127860242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Soteria: Offline Software Protection within Low-cost Embedded Devices Soteria:低成本嵌入式设备中的离线软件保护
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2856129
J. Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, F. Freiling, I. Verbauwhede
Protecting the intellectual property of software that is distributed to third-party devices which are not under full control of the software author is difficult to achieve on commodity hardware today. Modern techniques of reverse engineering such as static and dynamic program analysis with system privileges are increasingly powerful, and despite possibilities of encryption, software eventually needs to be processed in clear by the CPU. To anyhow be able to protect software on these devices, a small part of the hardware must be considered trusted. In the past, general purpose trusted computing bases added to desktop computers resulted in costly and rather heavyweight solutions. In contrast, we present Soteria, a lightweight solution for low-cost embedded systems. At its heart, Soteria is a program-counter based memory access control extension for the TI MSP430 microprocessor. Based on our open implementation of Soteria as an openMSP430 extension, and our FPGA-based evaluation, we show that the proposed solution has a minimal performance, size and cost overhead while effectively protecting the confidentiality and integrity of an application's code against all kinds of software attacks including attacks from the system level.
对分发给第三方设备的软件的知识产权进行保护,而这些设备又不受软件作者的完全控制,这在今天的商用硬件上很难实现。现代逆向工程技术,如具有系统特权的静态和动态程序分析,越来越强大,尽管有加密的可能性,软件最终需要由CPU明确地处理。无论如何,为了能够保护这些设备上的软件,硬件的一小部分必须被认为是可信的。过去,将通用的可信计算基础添加到桌面计算机中会产生昂贵且相当重量级的解决方案。相反,我们提出了Soteria,一种用于低成本嵌入式系统的轻量级解决方案。Soteria的核心是一个基于程序计数器的存储器访问控制扩展,用于TI MSP430微处理器。基于Soteria作为openMSP430扩展的开放实现,以及我们基于fpga的评估,我们表明所提出的解决方案具有最小的性能,尺寸和成本开销,同时有效地保护应用程序代码的机密性和完整性,免受各种软件攻击,包括来自系统级的攻击。
{"title":"Soteria: Offline Software Protection within Low-cost Embedded Devices","authors":"J. Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, F. Freiling, I. Verbauwhede","doi":"10.1145/2818000.2856129","DOIUrl":"https://doi.org/10.1145/2818000.2856129","url":null,"abstract":"Protecting the intellectual property of software that is distributed to third-party devices which are not under full control of the software author is difficult to achieve on commodity hardware today. Modern techniques of reverse engineering such as static and dynamic program analysis with system privileges are increasingly powerful, and despite possibilities of encryption, software eventually needs to be processed in clear by the CPU. To anyhow be able to protect software on these devices, a small part of the hardware must be considered trusted. In the past, general purpose trusted computing bases added to desktop computers resulted in costly and rather heavyweight solutions. In contrast, we present Soteria, a lightweight solution for low-cost embedded systems. At its heart, Soteria is a program-counter based memory access control extension for the TI MSP430 microprocessor. Based on our open implementation of Soteria as an openMSP430 extension, and our FPGA-based evaluation, we show that the proposed solution has a minimal performance, size and cost overhead while effectively protecting the confidentiality and integrity of an application's code against all kinds of software attacks including attacks from the system level.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122840634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks DynaGuard:基于金丝雀的盔甲保护,防止暴力攻击
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818031
Theofilos Petsios, V. Kemerlis, M. Polychronakis, A. Keromytis
Over the past decade many exploit mitigation techniques have been introduced to defend against memory corruption attacks. W^X, ASLR, and canary-based protections are nowadays widely deployed and considered standard practice. However, despite the fact that these techniques have evolved over time, they still suffer from limitations that enable skilled adversaries to bypass them. In this work, we focus on countermeasures against the byte-by-byte discovery of stack canaries in forking programs. This limitation, although known for years, has yet to be addressed effectively, and was recently abused by a series of exploits that allowed for the remote compromise of the popular Nginx web server and a full ASLR bypass in x86-64 Linux. We present DynaGuard, an extension to canary-based protections that further armors hardened applications against brute-force canary attacks. We have implemented DynaGuard in two flavors: a compiler-based version, which incurs an average runtime overhead of 1.2%, and a version based on dynamic binary instrumentation, which can protect binary-only applications without requiring access to source code. We have evaluated both implementations using a set of popular server applications and benchmark suites, and examined how the proposed design overcomes the limitations of previous proposals, ensuring application correctness and seamless integration with third-party software.
在过去的十年中,已经引入了许多漏洞利用缓解技术来防御内存损坏攻击。W^X、ASLR和基于金丝雀的保护现在被广泛部署并被认为是标准实践。然而,尽管这些技术随着时间的推移而发展,它们仍然受到限制,使熟练的对手能够绕过它们。在这项工作中,我们专注于针对分叉程序中逐字节发现堆栈金丝雀的对策。这个限制,虽然已经知道很多年了,但还没有被有效地解决,最近被一系列的漏洞所滥用,这些漏洞允许远程入侵流行的Nginx web服务器,并在x86-64 Linux中完全绕过ASLR。我们提出了DynaGuard,这是一个基于金丝雀的保护的扩展,它进一步强化了应用程序,防止暴力金丝雀攻击。我们以两种方式实现了DynaGuard:一种是基于编译器的版本,它的平均运行时开销为1.2%;另一种是基于动态二进制检测的版本,它可以保护仅二进制的应用程序,而不需要访问源代码。我们使用一组流行的服务器应用程序和基准套件评估了这两种实现,并检查了建议的设计如何克服先前建议的局限性,确保应用程序的正确性和与第三方软件的无缝集成。
{"title":"DynaGuard: Armoring Canary-based Protections against Brute-force Attacks","authors":"Theofilos Petsios, V. Kemerlis, M. Polychronakis, A. Keromytis","doi":"10.1145/2818000.2818031","DOIUrl":"https://doi.org/10.1145/2818000.2818031","url":null,"abstract":"Over the past decade many exploit mitigation techniques have been introduced to defend against memory corruption attacks. W^X, ASLR, and canary-based protections are nowadays widely deployed and considered standard practice. However, despite the fact that these techniques have evolved over time, they still suffer from limitations that enable skilled adversaries to bypass them. In this work, we focus on countermeasures against the byte-by-byte discovery of stack canaries in forking programs. This limitation, although known for years, has yet to be addressed effectively, and was recently abused by a series of exploits that allowed for the remote compromise of the popular Nginx web server and a full ASLR bypass in x86-64 Linux. We present DynaGuard, an extension to canary-based protections that further armors hardened applications against brute-force canary attacks. We have implemented DynaGuard in two flavors: a compiler-based version, which incurs an average runtime overhead of 1.2%, and a version based on dynamic binary instrumentation, which can protect binary-only applications without requiring access to source code. We have evaluated both implementations using a set of popular server applications and benchmark suites, and examined how the proposed design overcomes the limitations of previous proposals, ensuring application correctness and seamless integration with third-party software.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Logical Partitions on Many-Core Platforms 多核平台上的逻辑分区
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818026
Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
Cloud platforms that use logical partitions to allocate dedicated resources to VMs can benefit from small and therefore secure hypervisors. Many-core platforms, with their abundant resources, are an attractive basis to create and deploy logical partitions on a large scale. However, many-core platforms are designed for efficient cross-core data sharing rather than isolation, which is a key requirement for logical partitions. Typically, logical partitions leverage hardware virtualization extensions that require complex CPU core enhancements. These extensions are not optimal for many-core platforms, where it is preferable to keep the cores as simple as possible. In this paper, we show that a simple address-space isolation mechanism, that can be implemented in the Network-on-Chip of the many-core processor, is sufficient to enable logical partitions. We implement the proposed change for the Intel Single-Chip Cloud Computer (SCC). We also design a cloud architecture that relies on a small and disengaged hypervisor for the security-enhanced Intel SCC. Our prototype hypervisor is 3.4K LOC which is comparable to the smallest hypervisors available today. Furthermore, virtual machines execute bare-metal avoiding runtime interaction with the hypervisor and virtualization overhead.
使用逻辑分区为虚拟机分配专用资源的云平台可以从小型因而安全的管理程序中受益。拥有丰富资源的多核平台是大规模创建和部署逻辑分区的理想基础。然而,许多核心平台是为高效的跨核心数据共享而不是隔离而设计的,而隔离是逻辑分区的关键要求。通常,逻辑分区利用需要复杂CPU核心增强的硬件虚拟化扩展。这些扩展对于多核平台来说并不是最优的,在多核平台上,最好保持核心尽可能简单。在本文中,我们展示了一个简单的地址空间隔离机制,可以在多核处理器的片上网络中实现,足以启用逻辑分区。我们在英特尔单芯片云计算机(SCC)上实现了提议的更改。我们还设计了一个云架构,它依赖于一个小型的、独立的管理程序,用于安全增强的英特尔SCC。我们的原型管理程序是3.4K LOC,与目前可用的最小管理程序相当。此外,虚拟机执行裸机,避免了与管理程序的运行时交互和虚拟化开销。
{"title":"Logical Partitions on Many-Core Platforms","authors":"Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun","doi":"10.1145/2818000.2818026","DOIUrl":"https://doi.org/10.1145/2818000.2818026","url":null,"abstract":"Cloud platforms that use logical partitions to allocate dedicated resources to VMs can benefit from small and therefore secure hypervisors. Many-core platforms, with their abundant resources, are an attractive basis to create and deploy logical partitions on a large scale. However, many-core platforms are designed for efficient cross-core data sharing rather than isolation, which is a key requirement for logical partitions. Typically, logical partitions leverage hardware virtualization extensions that require complex CPU core enhancements. These extensions are not optimal for many-core platforms, where it is preferable to keep the cores as simple as possible. In this paper, we show that a simple address-space isolation mechanism, that can be implemented in the Network-on-Chip of the many-core processor, is sufficient to enable logical partitions. We implement the proposed change for the Intel Single-Chip Cloud Computer (SCC). We also design a cloud architecture that relies on a small and disengaged hypervisor for the security-enhanced Intel SCC. Our prototype hypervisor is 3.4K LOC which is comparable to the smallest hypervisors available today. Furthermore, virtual machines execute bare-metal avoiding runtime interaction with the hypervisor and virtualization overhead.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131891007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PARS: A Uniform and Open-source Password Analysis and Research System 一个统一的开源密码分析与研究系统
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818018
S. Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, R. Beyah
In this paper, we introduce an open-source and modular password analysis and research system, PARS, which provides a uniform, comprehensive and scalable research platform for password security. To the best of our knowledge, PARS is the first such system that enables researchers to conduct fair and comparable password security research. PARS contains 12 state-of-the-art cracking algorithms, 15 intra-site and cross-site password strength metrics, 8 academic password meters, and 15 of the 24 commercial password meters from the top-150 websites ranked by Alexa. Also, detailed taxonomies and large-scale evaluations of the PARS modules are presented in the paper.
本文介绍了一个开源、模块化的密码分析与研究系统PARS,为密码安全研究提供了一个统一、全面、可扩展的研究平台。据我们所知,PARS是第一个这样的系统,使研究人员能够进行公平和可比的密码安全研究。PARS包含12个最先进的破解算法,15个站点内和跨站点密码强度指标,8个学术密码计量,以及Alexa排名前150位网站中24个商业密码计量中的15个。此外,本文还对这些模块进行了详细的分类和大规模的评估。
{"title":"PARS: A Uniform and Open-source Password Analysis and Research System","authors":"S. Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, R. Beyah","doi":"10.1145/2818000.2818018","DOIUrl":"https://doi.org/10.1145/2818000.2818018","url":null,"abstract":"In this paper, we introduce an open-source and modular password analysis and research system, PARS, which provides a uniform, comprehensive and scalable research platform for password security. To the best of our knowledge, PARS is the first such system that enables researchers to conduct fair and comparable password security research. PARS contains 12 state-of-the-art cracking algorithms, 15 intra-site and cross-site password strength metrics, 8 academic password meters, and 15 of the 24 commercial password meters from the top-150 websites ranked by Alexa. Also, detailed taxonomies and large-scale evaluations of the PARS modules are presented in the paper.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116041977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases SeSQLite:安全增强SQLite: Android数据库的强制访问控制
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818041
S. Mutti, Enrico Bacis, S. Paraboschi
SQLite is the most widely deployed in-process library that implements a SQL database engine. It offers high storage efficiency, fast query operation and small memory needs. Due to the fact that a complete SQLite database is stored in a single cross-platform disk file and SQLite does not support multiple users, anyone who has direct access to the file can read the whole database content. SELinux was originally developed as a Mandatory Access Control (MAC) mechanism for Linux to demonstrate how to overcome DAC limitations. However, SELinux provides per-file protection, thus the database file is treated as an atomic unit, impeding the definition of a fine-grained mandatory access control (MAC) policy for database objects. We introduce SeSQLite, an SQLite extension that integrates SELinux access controls into SQLite with minimal performance and storage overhead. SeSQLite implements labeling and access control at both schema level (for tables and columns) and row level. This permits the management of a fine-grained access policy for database objects. A prototype has been implemented and it has been used to improve the security of Android Content Providers.
SQLite是部署最广泛的进程内库,它实现了SQL数据库引擎。它具有存储效率高、查询操作快、内存需求小等特点。由于完整的SQLite数据库存储在单个跨平台磁盘文件中,SQLite不支持多个用户,因此任何直接访问该文件的人都可以读取整个数据库内容。SELinux最初是作为Linux的强制访问控制(MAC)机制开发的,用于演示如何克服DAC限制。但是,SELinux提供了逐文件保护,因此数据库文件被视为原子单元,这妨碍了为数据库对象定义细粒度强制访问控制(MAC)策略。我们介绍SeSQLite,这是一个SQLite扩展,它以最小的性能和存储开销将SELinux访问控制集成到SQLite中。SeSQLite在模式级别(对于表和列)和行级别实现标记和访问控制。这允许管理数据库对象的细粒度访问策略。一个原型已经实现,它已经被用来提高Android内容提供商的安全性。
{"title":"SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases","authors":"S. Mutti, Enrico Bacis, S. Paraboschi","doi":"10.1145/2818000.2818041","DOIUrl":"https://doi.org/10.1145/2818000.2818041","url":null,"abstract":"SQLite is the most widely deployed in-process library that implements a SQL database engine. It offers high storage efficiency, fast query operation and small memory needs. Due to the fact that a complete SQLite database is stored in a single cross-platform disk file and SQLite does not support multiple users, anyone who has direct access to the file can read the whole database content. SELinux was originally developed as a Mandatory Access Control (MAC) mechanism for Linux to demonstrate how to overcome DAC limitations. However, SELinux provides per-file protection, thus the database file is treated as an atomic unit, impeding the definition of a fine-grained mandatory access control (MAC) policy for database objects. We introduce SeSQLite, an SQLite extension that integrates SELinux access controls into SQLite with minimal performance and storage overhead. SeSQLite implements labeling and access control at both schema level (for tables and columns) and row level. This permits the management of a fine-grained access policy for database objects. A prototype has been implemented and it has been used to improve the security of Android Content Providers.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks 新兴的图像游戏验证码,用于抵抗自动和人类求解器中继攻击
Pub Date : 2015-12-07 DOI: 10.1145/2818000.2818006
Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken using automated attacks based on image processing and machine learning techniques. Moreover, most existing CAPTCHAs are completely vulnerable to human-solver relay attacks, whereby CAPTCHA challenges are simply outsourced to a remote human solver. In this paper, we introduce a new class of CAPTCHAs that can not only resist automated attacks but can also make relay attacks hard and detectable. These CAPTCHAs are carefully built on the notions of dynamic cognitive games (DCG) and emerging images (EI), present in the literature. While existing CAPTCHAs based on the DCG notion alone (e.g., an object matching game embedded in a clear background) are prone to automated attacks and those based on the EI notion alone (e.g., moving text embedded in emerging images) are prone to relay attacks, we show that a careful amalgamation of the two notions can resist both forms of attacks. Specifically, we formalize, design and implement a concrete instantiation of EI-DCG CAPTCHAs, and demonstrate its security with respect to image processing and object tracking techniques as well as their resistance to and detectability of relay attacks.
验证码是网络安全领域的重要支柱。然而,目前的captcha并不能完全满足网络安全要求。许多现有的验证码可以使用基于图像处理和机器学习技术的自动攻击来破解。此外,大多数现有的CAPTCHA完全容易受到人类求解器中继攻击,因此CAPTCHA挑战只是简单地外包给远程人类求解器。在本文中,我们介绍了一类新的captcha,它不仅可以抵抗自动攻击,还可以使中继攻击变得困难和可检测。这些验证码是根据文献中出现的动态认知游戏(DCG)和新兴图像(EI)的概念精心构建的。虽然现有的仅基于DCG概念的验证码(例如,嵌入在清晰背景中的对象匹配游戏)容易受到自动攻击,而仅基于EI概念的验证码(例如,嵌入在新兴图像中的移动文本)容易受到中继攻击,但我们表明,仔细合并这两种概念可以抵御两种形式的攻击。具体而言,我们形式化,设计和实现了EI-DCG验证码的具体实例,并展示了其在图像处理和对象跟踪技术方面的安全性,以及它们对中继攻击的抵抗力和可检测性。
{"title":"Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks","authors":"Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang","doi":"10.1145/2818000.2818006","DOIUrl":"https://doi.org/10.1145/2818000.2818006","url":null,"abstract":"CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken using automated attacks based on image processing and machine learning techniques. Moreover, most existing CAPTCHAs are completely vulnerable to human-solver relay attacks, whereby CAPTCHA challenges are simply outsourced to a remote human solver. In this paper, we introduce a new class of CAPTCHAs that can not only resist automated attacks but can also make relay attacks hard and detectable. These CAPTCHAs are carefully built on the notions of dynamic cognitive games (DCG) and emerging images (EI), present in the literature. While existing CAPTCHAs based on the DCG notion alone (e.g., an object matching game embedded in a clear background) are prone to automated attacks and those based on the EI notion alone (e.g., moving text embedded in emerging images) are prone to relay attacks, we show that a careful amalgamation of the two notions can resist both forms of attacks. Specifically, we formalize, design and implement a concrete instantiation of EI-DCG CAPTCHAs, and demonstrate its security with respect to image processing and object tracking techniques as well as their resistance to and detectability of relay attacks.","PeriodicalId":338725,"journal":{"name":"Proceedings of the 31st Annual Computer Security Applications Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126596075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Proceedings of the 31st Annual Computer Security Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1