首页 > 最新文献

2016 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-Channels MIGRATE:迈向轻量级移动目标防御云侧通道
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.28
M. Azab, M. Eltoweissy
Recent research has demonstrated the severity of co-residency side-channel attacks on computing clouds. These attacks have been successfully employed by malicious tenants to extract sensitive private information from selected neighboring tenants. Solutions towards addressing such attacks have presented customized solutions for specific variants of these attacks that often require significant modifications to the hardware, client virtual machines (VM), or hypervisors. These solutions are not generic and will not succeed with mutating versions of these attacks. Except for the impractical, resource inefficient, and costly single tenant solutions, co-residency will always be an issue to cloud service providers. In this paper, inspired from the camouflaging process of the sea chameleons evading predators, we present MIGRATE. MIGRATE is a container management framework that employs resource-efficient, scalable, real-time moving target defense to obfuscate the container execution behavior complicating the attacker's task to locate their targets. MIGRATE, offers generic defense against side-channel attacks and employs efficient real-time probabilistic random migrations of cloud tenants' applications contained in Linux containers between different hosts. To minimize the probability of attacker-victim co-residency on the same host. Eliminating the stable co-residency issue eliminates most of the side-channel attacks that face such a platform. Given the current implementation of MIGRATE tested on VMware V-Sphere Cloud, results showed that it can induce high frequency migrations with almost no effect on the enclosed applications making it suitable for mission-critical applications and as a mitigation against fast side-channel attacks.
最近的研究已经证明了对计算云的共同驻留侧信道攻击的严重性。恶意租户已经成功地利用这些攻击从选定的相邻租户中提取敏感的私有信息。针对此类攻击的解决方案提供了针对这些攻击的特定变体的定制解决方案,这些变体通常需要对硬件、客户机虚拟机(VM)或管理程序进行重大修改。这些解决方案不是通用的,对于这些攻击的变异版本也不会成功。除了不切实际、资源低效和昂贵的单租户解决方案外,共同驻留将始终是云服务提供商面临的问题。本文以海洋变色龙躲避捕食者的伪装过程为灵感,提出了一种名为MIGRATE的动物模型。MIGRATE是一个容器管理框架,它采用资源高效、可伸缩、实时移动目标防御来混淆容器执行行为,从而使攻击者定位目标的任务复杂化。migration,提供针对侧通道攻击的通用防御,并在不同主机之间对包含在Linux容器中的云租户的应用程序进行高效的实时概率随机迁移。以减少攻击者和受害者在同一主机上共同居住的可能性。消除稳定的共同驻留问题消除了此类平台面临的大多数侧信道攻击。考虑到目前在VMware V-Sphere Cloud上测试的MIGRATE实现,结果表明,它可以诱导高频迁移,而对封闭的应用程序几乎没有影响,因此适用于关键任务应用程序,并可作为快速侧信道攻击的缓解措施。
{"title":"MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-Channels","authors":"M. Azab, M. Eltoweissy","doi":"10.1109/SPW.2016.28","DOIUrl":"https://doi.org/10.1109/SPW.2016.28","url":null,"abstract":"Recent research has demonstrated the severity of co-residency side-channel attacks on computing clouds. These attacks have been successfully employed by malicious tenants to extract sensitive private information from selected neighboring tenants. Solutions towards addressing such attacks have presented customized solutions for specific variants of these attacks that often require significant modifications to the hardware, client virtual machines (VM), or hypervisors. These solutions are not generic and will not succeed with mutating versions of these attacks. Except for the impractical, resource inefficient, and costly single tenant solutions, co-residency will always be an issue to cloud service providers. In this paper, inspired from the camouflaging process of the sea chameleons evading predators, we present MIGRATE. MIGRATE is a container management framework that employs resource-efficient, scalable, real-time moving target defense to obfuscate the container execution behavior complicating the attacker's task to locate their targets. MIGRATE, offers generic defense against side-channel attacks and employs efficient real-time probabilistic random migrations of cloud tenants' applications contained in Linux containers between different hosts. To minimize the probability of attacker-victim co-residency on the same host. Eliminating the stable co-residency issue eliminates most of the side-channel attacks that face such a platform. Given the current implementation of MIGRATE tested on VMware V-Sphere Cloud, results showed that it can induce high frequency migrations with almost no effect on the enclosed applications making it suitable for mission-critical applications and as a mitigation against fast side-channel attacks.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Perceptions of Risk in Mobile Transaction 移动交易中的风险感知
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.37
Shari Trewin, C. Swart, Larry Koved, Kapil Singh
Mobile users are unlikely to guard against information security risks that do not come to mind in typical situations. As more people conduct sensitive transactions through mobile devices, what risks do they perceive? To inform the design of mobile applications we present a user study of perceived risk for information technology workers accessing company data, consumers using mobile personal banking, and doctors accessing medical records. Shoulder surfing and network snooping were the most commonly cited classes of risk, and perceived risk was influenced by the surrounding environment and source of information. However, overall risk awareness was low. The possible risks of device theft and loss, hacking, malware and data stored on devices were not prominent concerns. The study also revealed differences in the way the groups think about network-related threats. Based on these results, we suggest research directions for effective protection of sensitive data in mobile environments.
移动用户不太可能防范在典型情况下不会想到的信息安全风险。随着越来越多的人通过移动设备进行敏感交易,他们认为存在哪些风险?为了为移动应用程序的设计提供信息,我们对信息技术工作者访问公司数据、消费者使用移动个人银行和医生访问医疗记录的感知风险进行了用户研究。肩上冲浪和网络窥探是最常见的风险类别,感知风险受周围环境和信息来源的影响。然而,总体风险意识较低。设备被盗和丢失、黑客攻击、恶意软件和存储在设备上的数据等可能存在的风险并不是主要的担忧。该研究还揭示了两组人对网络相关威胁的看法存在差异。在此基础上,提出了在移动环境中有效保护敏感数据的研究方向。
{"title":"Perceptions of Risk in Mobile Transaction","authors":"Shari Trewin, C. Swart, Larry Koved, Kapil Singh","doi":"10.1109/SPW.2016.37","DOIUrl":"https://doi.org/10.1109/SPW.2016.37","url":null,"abstract":"Mobile users are unlikely to guard against information security risks that do not come to mind in typical situations. As more people conduct sensitive transactions through mobile devices, what risks do they perceive? To inform the design of mobile applications we present a user study of perceived risk for information technology workers accessing company data, consumers using mobile personal banking, and doctors accessing medical records. Shoulder surfing and network snooping were the most commonly cited classes of risk, and perceived risk was influenced by the surrounding environment and source of information. However, overall risk awareness was low. The possible risks of device theft and loss, hacking, malware and data stored on devices were not prominent concerns. The study also revealed differences in the way the groups think about network-related threats. Based on these results, we suggest research directions for effective protection of sensitive data in mobile environments.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research Report: Mitigating LangSec Problems with Capabilities 研究报告:用能力减轻LangSec问题
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.57
N. Filardo
Security and privacy of computation, and the related concept of (deliberate) sharing, have, historically, largely been afterthoughts. In a traditional multi-user, multi-application Web hosting environment, typically applications are public by default. Applications wishing to offer a notion of private resources must take it upon themselves to independently manage authentication and authorization of users, leading to difficult and disjointed notions of access and sharing. In such a context, LangSec-based vulnerabilities threaten catastrophic loss of privacy for all users of the system, likely even of non-vulnerable applications. This is a tragic state of affairs, but is thankfully not inevitable! We present the Sandstorm system, a capability-based, private-bydefault, tightly-sandboxing, proactively secure environment for running web applications, complete with a single, pervasive sharing mechanism. Sandstorm, and capability systems, are likely of interest to the LangSec community: LangSec bugs are mitigated through the robust isolation imposed by the Sandstorm supervisor, and the mechanism of capability systems offers the potential to turn difficult authorization decisions into LangSec's bread and butter, namely syntactic constraints on requests: every well-formed request which can be stated is authorized. We present aspects of the Sandstorm system and show how those aspects have, by building systematic protection into several levels of the system, dramatically reduced the severity of LangSec bugs in hosted applications. To study the range of impact, we will characterize addressed vulnerabilities using MITRE's Common Weakness Enumeration (CWE) scheme.
从历史上看,计算的安全性和隐私性,以及相关的(有意的)共享概念,在很大程度上是事后才想到的。在传统的多用户、多应用程序Web托管环境中,默认情况下应用程序通常是公共的。希望提供私有资源概念的应用程序必须独立地管理用户的身份验证和授权,从而导致访问和共享概念的困难和脱节。在这种情况下,基于langsec的漏洞可能会对系统的所有用户(甚至是非易受攻击的应用程序)造成灾难性的隐私损失。这是一种悲惨的状况,但谢天谢地并不是不可避免的!我们介绍了Sandstorm系统,这是一个基于功能的、默认私有的、严格沙盒化的、用于运行web应用程序的主动安全环境,具有单一的、普遍的共享机制。Sandstorm和能力系统可能会引起LangSec社区的兴趣:通过Sandstorm管理器施加的健壮隔离,LangSec的bug得到了缓解,能力系统的机制提供了将困难的授权决策转化为LangSec的面包和面包的潜力,即对请求的语法约束:每个可以声明的格式良好的请求都得到了授权。我们展示了Sandstorm系统的各个方面,并展示了这些方面是如何通过在系统的几个级别中构建系统保护来显著降低托管应用程序中LangSec漏洞的严重程度的。为了研究影响范围,我们将使用MITRE的通用弱点枚举(CWE)方案来描述已解决的漏洞。
{"title":"Research Report: Mitigating LangSec Problems with Capabilities","authors":"N. Filardo","doi":"10.1109/SPW.2016.57","DOIUrl":"https://doi.org/10.1109/SPW.2016.57","url":null,"abstract":"Security and privacy of computation, and the related concept of (deliberate) sharing, have, historically, largely been afterthoughts. In a traditional multi-user, multi-application Web hosting environment, typically applications are public by default. Applications wishing to offer a notion of private resources must take it upon themselves to independently manage authentication and authorization of users, leading to difficult and disjointed notions of access and sharing. In such a context, LangSec-based vulnerabilities threaten catastrophic loss of privacy for all users of the system, likely even of non-vulnerable applications. This is a tragic state of affairs, but is thankfully not inevitable! We present the Sandstorm system, a capability-based, private-bydefault, tightly-sandboxing, proactively secure environment for running web applications, complete with a single, pervasive sharing mechanism. Sandstorm, and capability systems, are likely of interest to the LangSec community: LangSec bugs are mitigated through the robust isolation imposed by the Sandstorm supervisor, and the mechanism of capability systems offers the potential to turn difficult authorization decisions into LangSec's bread and butter, namely syntactic constraints on requests: every well-formed request which can be stated is authorized. We present aspects of the Sandstorm system and show how those aspects have, by building systematic protection into several levels of the system, dramatically reduced the severity of LangSec bugs in hosted applications. To study the range of impact, we will characterize addressed vulnerabilities using MITRE's Common Weakness Enumeration (CWE) scheme.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129667340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Posteriori Taint-Tracking for Demonstrating Non-interference in Expressive Low-Level Languages 表达性低级语言中无干扰的后验污点跟踪
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.58
P. Aldous, M. Might
We previously presented a theory of analysis for expressive low-level languages that is capable of proving non-interference for expressive languages. We now provide an independent result for the taint-flow analysis that drives tracking of information. In particular, we show that the taint-tracking can be derived from the results of a taint-free analysis. In addition to improving performance, this independence broadens the applicability of the underlying approach to information-flow analysis.
我们之前提出了一种分析表达性低级语言的理论,该理论能够证明表达性语言的非干扰性。我们现在为驱动信息跟踪的污染流分析提供了一个独立的结果。特别地,我们证明了可以从无污染分析的结果中得出污染跟踪。除了提高性能之外,这种独立性还扩大了底层方法对信息流分析的适用性。
{"title":"A Posteriori Taint-Tracking for Demonstrating Non-interference in Expressive Low-Level Languages","authors":"P. Aldous, M. Might","doi":"10.1109/SPW.2016.58","DOIUrl":"https://doi.org/10.1109/SPW.2016.58","url":null,"abstract":"We previously presented a theory of analysis for expressive low-level languages that is capable of proving non-interference for expressive languages. We now provide an independent result for the taint-flow analysis that drives tracking of information. In particular, we show that the taint-tracking can be derived from the results of a taint-free analysis. In addition to improving performance, this independence broadens the applicability of the underlying approach to information-flow analysis.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116520482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Oblivious Mechanisms in Differential Privacy: Experiments, Conjectures, and Open Questions 差异隐私中的遗忘机制:实验、猜想和开放性问题
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.27
Chien-Lun Chen, R. Pal, L. Golubchik
Differential privacy (DP) is a framework to quantify to what extent individual privacy in a statistical database is preserved while releasing useful aggregate information about the database. In this work, we aim an exploratory study to understand questions related to the optimality of noise generation mechanisms (NGMs) in differential privacy by taking into consideration the (i) query sensitivity, (ii) query side information, and (iii) the presence of longitudinal and collusion attacks. The results/observations from our study serve three important purposes: (i) provide us with conjectures on appropriate (in the sense of privacy-utility tradeoffs) oblivious NGM selection for scalar queries in both non-Bayesian as well as Bayesian user settings, (ii) provide supporting evidence and counterexamples to existing theory results on the optimality of NGMs when they are tested on a relaxed assumption set, and (ii) lead to a string of interesting open questions for the theory community in relation to the design and analysis of provably optimal oblivious differential privacy mechanisms.
差分隐私(DP)是一个框架,用于量化统计数据库中个人隐私的保留程度,同时发布有关数据库的有用汇总信息。在这项工作中,我们的目的是进行探索性研究,通过考虑(i)查询敏感性,(ii)查询侧信息,以及(iii)纵向和共谋攻击的存在,了解与差异隐私中噪声产生机制(NGMs)最优性相关的问题。我们的研究结果/观察结果有三个重要目的:(i)为我们提供关于在非贝叶斯和贝叶斯用户设置中对标量查询进行适当(在隐私效用权衡的意义上)无关的NGM选择的猜想,(ii)为在宽松假设集上测试NGM的最优性时的现有理论结果提供支持证据和反例。(ii)为理论界带来一系列有趣的开放问题,涉及可证明的最优遗忘微分隐私机制的设计和分析。
{"title":"Oblivious Mechanisms in Differential Privacy: Experiments, Conjectures, and Open Questions","authors":"Chien-Lun Chen, R. Pal, L. Golubchik","doi":"10.1109/SPW.2016.27","DOIUrl":"https://doi.org/10.1109/SPW.2016.27","url":null,"abstract":"Differential privacy (DP) is a framework to quantify to what extent individual privacy in a statistical database is preserved while releasing useful aggregate information about the database. In this work, we aim an exploratory study to understand questions related to the optimality of noise generation mechanisms (NGMs) in differential privacy by taking into consideration the (i) query sensitivity, (ii) query side information, and (iii) the presence of longitudinal and collusion attacks. The results/observations from our study serve three important purposes: (i) provide us with conjectures on appropriate (in the sense of privacy-utility tradeoffs) oblivious NGM selection for scalar queries in both non-Bayesian as well as Bayesian user settings, (ii) provide supporting evidence and counterexamples to existing theory results on the optimality of NGMs when they are tested on a relaxed assumption set, and (ii) lead to a string of interesting open questions for the theory community in relation to the design and analysis of provably optimal oblivious differential privacy mechanisms.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128132664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Declarative Verifiable SDI Specifications 声明式可验证SDI规范
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.49
R. McGeer
The point of Software-Defined Infrastructure is an infrastructure that is at once more flexible, controllable, and transparent to user and developer. One important characteristic of this infrastructure is that it is not owned or controlled by the user. At runtime, it is an opaque black box. Thus, it must have guaranteed properties of both performance and function. Infrastructure also has limited visibility and debuggability. It's hard to diagnose network problems, and it's hard to diagnose runtime issues on a remote system. Thus, programs which manipulate the infrastructure (e.g., orchestration systems, SDN applications, etc.) should have their infrastructure manipulations verified, to the extent that this is possible â?A S we need to catch bugs statically to the extent that we can, performance and correctness both. Fortunately, infrastructure configurations ought to be inherently verifiable. Verification of state-free systems is in NP; verification of finite-state systems, at least for safety properties, is similarly in NP It has been shown by a number of authors that OpenFlow rulesets are state-free, and verification is therefore in NP. Similar arguments can be made for various orchestration layers and workflow engines, depending on precise semantics. These results imply that the underlying model of computation for configuration of software-defined networking and at least some elements of software-defined infrastructure are state-free or, at worst, finite-state, and therefore that verification of these systems is relatively tractable. It is, at the least, not undecidable. The large challenge before the community is then to design configuration models for software-defined infrastructure that preserve the precise and weak semantics of the implementation domain; offer appropriate abstractions of performance characteristics; and nonetheless retain usability and concision.
软件定义的基础设施的重点是一个对用户和开发人员来说更加灵活、可控和透明的基础设施。这种基础设施的一个重要特征是它不属于用户,也不受用户控制。在运行时,它是一个不透明的黑盒。因此,它必须保证性能和功能。基础设施也具有有限的可见性和可调试性。很难诊断网络问题,也很难诊断远程系统上的运行时问题。因此,操作基础设施的程序(例如,编排系统、SDN应用程序等)应该在可能的范围内验证其基础设施操作?因此,我们需要尽可能静态地捕获bug,同时兼顾性能和正确性。幸运的是,基础设施配置本质上应该是可验证的。无状态系统的验证是NP的;有限状态系统的验证,至少对于安全属性,在NP中是类似的。许多作者已经表明,OpenFlow规则集是无状态的,因此验证是在NP中。对于各种编排层和工作流引擎,也可以提出类似的论点,这取决于精确的语义。这些结果意味着软件定义网络配置的底层计算模型和软件定义基础设施的至少一些元素是无状态的,或者在最坏的情况下是有限状态的,因此这些系统的验证相对容易处理。至少,这不是不可决定的。社区面临的巨大挑战是为软件定义的基础设施设计配置模型,以保持实现领域的精确和弱语义;提供性能特征的适当抽象;同时保留可用性和简洁性。
{"title":"Declarative Verifiable SDI Specifications","authors":"R. McGeer","doi":"10.1109/SPW.2016.49","DOIUrl":"https://doi.org/10.1109/SPW.2016.49","url":null,"abstract":"The point of Software-Defined Infrastructure is an infrastructure that is at once more flexible, controllable, and transparent to user and developer. One important characteristic of this infrastructure is that it is not owned or controlled by the user. At runtime, it is an opaque black box. Thus, it must have guaranteed properties of both performance and function. Infrastructure also has limited visibility and debuggability. It's hard to diagnose network problems, and it's hard to diagnose runtime issues on a remote system. Thus, programs which manipulate the infrastructure (e.g., orchestration systems, SDN applications, etc.) should have their infrastructure manipulations verified, to the extent that this is possible â?A S we need to catch bugs statically to the extent that we can, performance and correctness both. Fortunately, infrastructure configurations ought to be inherently verifiable. Verification of state-free systems is in NP; verification of finite-state systems, at least for safety properties, is similarly in NP It has been shown by a number of authors that OpenFlow rulesets are state-free, and verification is therefore in NP. Similar arguments can be made for various orchestration layers and workflow engines, depending on precise semantics. These results imply that the underlying model of computation for configuration of software-defined networking and at least some elements of software-defined infrastructure are state-free or, at worst, finite-state, and therefore that verification of these systems is relatively tractable. It is, at the least, not undecidable. The large challenge before the community is then to design configuration models for software-defined infrastructure that preserve the precise and weak semantics of the implementation domain; offer appropriate abstractions of performance characteristics; and nonetheless retain usability and concision.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134174662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Mobile Malware: An Artificial Immunity Approach 移动恶意软件检测:一种人工免疫方法
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.32
James Brown, Mohd Anwar, G. Dozier
Inspired by the human immune system, we explore the development of a new multiple detector set artificial immune system (mAIS) for the detection of mobile malware based on the information flows in Android apps. mAISs differ from conventional AISs in that multiple detector sets are evolved concurrently via negative selection. Typically, the first detector set is composed of detectors that match information flows associated with malicious apps while the second detector set is composed of detectors that match the information flows associated with benign apps. The mAIS presented in this paper incorporates feature selection along with a negative selection technique known as the split detector method (SDM). This new mAIS has been compared with a variety of conventional AISs and mAISs using a dataset of information flows captured from malicious and benign Android applications. Our preliminary results show that the newly designed mAIS outperforms the conventional AISs and mAISs in terms of accuracy and false positive rate of malware detection. This paper ends with a discussion of how mAISs can be used to solve dynamic cybersecurity problems as well as a discussion of our future research. This approach achieved 93.33% accuracy with a 0.00% false positive rate.
受人体免疫系统的启发,我们基于Android应用程序中的信息流,探索开发一种新的多检测器集人工免疫系统(mAIS),用于检测移动恶意软件。mais与传统ais的不同之处在于,多个检测器集通过负选择同时进化。通常,第一个检测器集由与恶意应用程序相关的信息流匹配的检测器组成,而第二个检测器集由与良性应用程序相关的信息流匹配的检测器组成。本文提出的mAIS结合了特征选择和一种被称为分裂检测器方法(SDM)的负选择技术。使用从恶意和良性Android应用程序捕获的信息流数据集,将这种新的mAIS与各种传统的ais和mAIS进行了比较。我们的初步结果表明,新设计的mAIS在恶意软件检测的准确性和误报率方面优于传统的mAIS和mAIS。本文最后讨论了如何使用mais来解决动态网络安全问题,并讨论了我们未来的研究。该方法的准确率为93.33%,假阳性率为0.00%。
{"title":"Detection of Mobile Malware: An Artificial Immunity Approach","authors":"James Brown, Mohd Anwar, G. Dozier","doi":"10.1109/SPW.2016.32","DOIUrl":"https://doi.org/10.1109/SPW.2016.32","url":null,"abstract":"Inspired by the human immune system, we explore the development of a new multiple detector set artificial immune system (mAIS) for the detection of mobile malware based on the information flows in Android apps. mAISs differ from conventional AISs in that multiple detector sets are evolved concurrently via negative selection. Typically, the first detector set is composed of detectors that match information flows associated with malicious apps while the second detector set is composed of detectors that match the information flows associated with benign apps. The mAIS presented in this paper incorporates feature selection along with a negative selection technique known as the split detector method (SDM). This new mAIS has been compared with a variety of conventional AISs and mAISs using a dataset of information flows captured from malicious and benign Android applications. Our preliminary results show that the newly designed mAIS outperforms the conventional AISs and mAISs in terms of accuracy and false positive rate of malware detection. This paper ends with a discussion of how mAISs can be used to solve dynamic cybersecurity problems as well as a discussion of our future research. This approach achieved 93.33% accuracy with a 0.00% false positive rate.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
In Search of Shotgun Parsers in Android Applications 在Android应用程序中搜索Shotgun解析器
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.41
Katherine Underwood, M. Locasto
In any software system, unprincipled handling of input data presents significant security risks. This is particularly true in the case of mobile platforms, where the prevalence of applications developed by amateur developers in combination with devices that hold a wealth of users' personal information can lead to significant security and privacy concerns. Of particular concern is the so-called shotgun parser pattern, in which input recognition is intermixed with input processing throughout the code base. In this work, we take the first steps toward building a tool for identification of shotgun parsers in Android applications. By extending the FlowDroid framework for static taint analysis, we are able to quantify the spread of untrusted data through 55 applications selected from 15 categories on the Google Play store. Our analysis reveals that on average, most untrusted input propagates a relatively short distance within the application code. However, we also find several specific instances of very long data propagations. In addition to providing a first look at the "state of parsing" in a variety of Android applications, our work in this paper lays the groundwork for more precise shotgun parser signature recognition.
在任何软件系统中,对输入数据的无原则处理都会带来重大的安全风险。在移动平台上尤其如此,业余开发者开发的应用程序与拥有大量用户个人信息的设备相结合,可能会导致严重的安全和隐私问题。特别值得关注的是所谓的散弹枪解析器模式,在这种模式中,输入识别与整个代码库中的输入处理混合在一起。在这项工作中,我们迈出了构建用于识别Android应用程序中的霰弹枪解析器的工具的第一步。通过扩展FlowDroid框架进行静态污染分析,我们能够量化从b谷歌Play商店的15个类别中选择的55个应用程序中不可信数据的传播。我们的分析表明,平均而言,大多数不可信的输入在应用程序代码中传播的距离相对较短。但是,我们还发现了一些非常长的数据传播的特定实例。除了提供对各种Android应用程序中的“解析状态”的初步了解之外,我们在本文中的工作还为更精确的霰弹枪解析器签名识别奠定了基础。
{"title":"In Search of Shotgun Parsers in Android Applications","authors":"Katherine Underwood, M. Locasto","doi":"10.1109/SPW.2016.41","DOIUrl":"https://doi.org/10.1109/SPW.2016.41","url":null,"abstract":"In any software system, unprincipled handling of input data presents significant security risks. This is particularly true in the case of mobile platforms, where the prevalence of applications developed by amateur developers in combination with devices that hold a wealth of users' personal information can lead to significant security and privacy concerns. Of particular concern is the so-called shotgun parser pattern, in which input recognition is intermixed with input processing throughout the code base. In this work, we take the first steps toward building a tool for identification of shotgun parsers in Android applications. By extending the FlowDroid framework for static taint analysis, we are able to quantify the spread of untrusted data through 55 applications selected from 15 categories on the Google Play store. Our analysis reveals that on average, most untrusted input propagates a relatively short distance within the application code. However, we also find several specific instances of very long data propagations. In addition to providing a first look at the \"state of parsing\" in a variety of Android applications, our work in this paper lays the groundwork for more precise shotgun parser signature recognition.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Privacy Harm Analysis: A Case Study on Smart Grids 隐私危害分析:以智能电网为例
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.21
S. De, D. Métayer
To carry out a true privacy risk analysis and go beyond a traditional security analysis, it is essential to distinguish the notions of feared events and their impacts, called "privacy harms" here, and to establish a link between them. In this paper, we provide a clear relationship among harms, feared events, privacy weaknesses and risk sources and describe their use in the analysis of smart grid systems. This work also lays the foundation for a more systematic and rigorous approach to privacy risk assessment.
要进行真正的隐私风险分析,超越传统的安全分析,必须区分恐惧事件及其影响的概念,在这里称为“隐私危害”,并建立它们之间的联系。在本文中,我们提供了危害、恐惧事件、隐私弱点和风险源之间的明确关系,并描述了它们在智能电网系统分析中的应用。这项工作也为更系统和严格的隐私风险评估方法奠定了基础。
{"title":"Privacy Harm Analysis: A Case Study on Smart Grids","authors":"S. De, D. Métayer","doi":"10.1109/SPW.2016.21","DOIUrl":"https://doi.org/10.1109/SPW.2016.21","url":null,"abstract":"To carry out a true privacy risk analysis and go beyond a traditional security analysis, it is essential to distinguish the notions of feared events and their impacts, called \"privacy harms\" here, and to establish a link between them. In this paper, we provide a clear relationship among harms, feared events, privacy weaknesses and risk sources and describe their use in the analysis of smart grid systems. This work also lays the foundation for a more systematic and rigorous approach to privacy risk assessment.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124671829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling 利用逻辑模型研究飞机安全和内部威胁
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.47
F. Kammüller, Manfred Kerber
In this paper we consider the limits of formal modeling of infrastructures and the application of social explanation for the analysis of insider threats in security and safety critical areas. As an area of study for the analysis we take examples from aviation, firstly since incidents are typically well-documented and secondly since it is an important area per se. In March 2015, a Germanwings flight crashed in the French Alps in what is quite firmly believed to have been intentionally caused by the copilot who locked the pilot out of the cockpit and programmed the autopilot on constant descent. We investigate the security controls and policies in airplanes against insider threats using logical modeling in Isabelle.
在本文中,我们考虑了基础设施形式化建模的局限性以及社会解释在安全和安全关键领域内部威胁分析中的应用。作为分析的研究领域,我们以航空为例,首先因为事件通常是有据可查的,其次因为它本身就是一个重要的领域。2015年3月,德国之翼(Germanwings)的一架飞机在法国阿尔卑斯山坠毁,人们确信这是副驾驶故意造成的,他将驾驶员锁在驾驶舱外,并将自动驾驶仪设置为持续下降模式。我们在Isabelle中使用逻辑建模来调查飞机上针对内部威胁的安全控制和策略。
{"title":"Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling","authors":"F. Kammüller, Manfred Kerber","doi":"10.1109/SPW.2016.47","DOIUrl":"https://doi.org/10.1109/SPW.2016.47","url":null,"abstract":"In this paper we consider the limits of formal modeling of infrastructures and the application of social explanation for the analysis of insider threats in security and safety critical areas. As an area of study for the analysis we take examples from aviation, firstly since incidents are typically well-documented and secondly since it is an important area per se. In March 2015, a Germanwings flight crashed in the French Alps in what is quite firmly believed to have been intentionally caused by the copilot who locked the pilot out of the cockpit and programmed the autopilot on constant descent. We investigate the security controls and policies in airplanes against insider threats using logical modeling in Isabelle.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114626107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2016 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1