首页 > 最新文献

2016 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
A Biosequence-Based Approach to Software Characterization 基于生物序列的软件表征方法
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.43
C. Oehmen, Elena S. Peterson, Aaron R. Phillips, Darren S. Curtis
For many applications, it is desirable to have a process for recognizing when software binaries are closely related without relying on them to be identical or have identical segments. But doing so in a dynamic environment is a nontrivial task because most approaches to software similarity require extensive and time-consuming analysis of a binary, or they fail to recognize executables that are similar but not identical. Presented herein is a novel biosequence-based method for quantifying similarity of executable binaries. Using this method, we show in an example application on large-scale multi-author codes that 1) the biosequence-based method has a statistical performance in recognizing and distinguishing between a collection of real-world high performance computing applications better than 90% of ideal, and 2) an example of using family-tree analysis to tune identification for a code subfamily can achieve better than 99% of ideal performance.
对于许多应用程序,希望有一个过程来识别何时软件二进制文件密切相关,而不依赖于它们是相同的或具有相同的段。但是,在动态环境中这样做是一项不平凡的任务,因为大多数软件相似性方法都需要对二进制文件进行广泛而耗时的分析,或者它们无法识别相似但不相同的可执行文件。本文提出了一种基于生物序列的可执行二进制文件相似性量化方法。使用该方法,我们在大规模多作者代码的示例应用程序中表明,1)基于生物序列的方法在识别和区分现实世界高性能计算应用程序集合方面具有优于理想90%的统计性能,2)使用家族树分析对代码子族进行调优识别的示例可以获得优于理想99%的性能。
{"title":"A Biosequence-Based Approach to Software Characterization","authors":"C. Oehmen, Elena S. Peterson, Aaron R. Phillips, Darren S. Curtis","doi":"10.1109/SPW.2016.43","DOIUrl":"https://doi.org/10.1109/SPW.2016.43","url":null,"abstract":"For many applications, it is desirable to have a process for recognizing when software binaries are closely related without relying on them to be identical or have identical segments. But doing so in a dynamic environment is a nontrivial task because most approaches to software similarity require extensive and time-consuming analysis of a binary, or they fail to recognize executables that are similar but not identical. Presented herein is a novel biosequence-based method for quantifying similarity of executable binaries. Using this method, we show in an example application on large-scale multi-author codes that 1) the biosequence-based method has a statistical performance in recognizing and distinguishing between a collection of real-world high performance computing applications better than 90% of ideal, and 2) an example of using family-tree analysis to tune identification for a code subfamily can achieve better than 99% of ideal performance.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126420617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Target Fragmentation in Android Apps 瞄准Android应用的碎片化
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.31
Patrick Mutchler, Y. Safaei, Adam Doupé, John C. Mitchell
Android apps declare a target version of the Android run-time platform. When run on devices with more recent Android versions, apps are executed in a compatibility mode that attempts to mimic the behavior of the older target version. This design has serious security consequences. Apps that target outdated Android versions disable important security changes to the Android platform. We call the problem of apps targeting outdated Android versions the target fragmentation problem. We analyze a dataset of 1,232,696 free Android apps collected between May, 2012 and December, 2015 and show that the target fragmentation problem is a serious concern across the entire app ecosystem and has not changed considerably in several years. In total, 93% of current apps target out-of-date platform versions and have a mean outdatedness of 686 days, 79% of apps are already out-of-date on the day they are uploaded to the app store. Finally, we examine seven security related changes to the Android platform that are disabled in apps that target outdated platform versions and show that target fragmentation hamstrings attempts to improve the security of Android apps.
Android应用程序声明Android运行时平台的目标版本。当运行在带有最新Android版本的设备上时,应用程序将以一种兼容模式执行,这种模式试图模仿较旧的目标版本的行为。这种设计具有严重的安全后果。针对过时Android版本的应用程序会禁用Android平台的重要安全更改。我们将应用瞄准过时Android版本的问题称为目标碎片化问题。我们分析了2012年5月至2015年12月期间收集的1,232,696款免费Android应用的数据集,发现目标碎片化问题在整个应用生态系统中都是一个严重的问题,并且几年来没有发生太大变化。总的来说,目前93%的应用瞄准的是过时的平台版本,平均过时期为686天,79%的应用在上传到应用商店的那一天就已经过时了。最后,我们分析了Android平台的7个安全相关变化,这些变化在针对过时平台版本的应用中被禁用,并表明目标碎片化阻碍了提高Android应用安全性的尝试。
{"title":"Target Fragmentation in Android Apps","authors":"Patrick Mutchler, Y. Safaei, Adam Doupé, John C. Mitchell","doi":"10.1109/SPW.2016.31","DOIUrl":"https://doi.org/10.1109/SPW.2016.31","url":null,"abstract":"Android apps declare a target version of the Android run-time platform. When run on devices with more recent Android versions, apps are executed in a compatibility mode that attempts to mimic the behavior of the older target version. This design has serious security consequences. Apps that target outdated Android versions disable important security changes to the Android platform. We call the problem of apps targeting outdated Android versions the target fragmentation problem. We analyze a dataset of 1,232,696 free Android apps collected between May, 2012 and December, 2015 and show that the target fragmentation problem is a serious concern across the entire app ecosystem and has not changed considerably in several years. In total, 93% of current apps target out-of-date platform versions and have a mean outdatedness of 686 days, 79% of apps are already out-of-date on the day they are uploaded to the app store. Finally, we examine seven security related changes to the Android platform that are disabled in apps that target outdated platform versions and show that target fragmentation hamstrings attempts to improve the security of Android apps.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Caradoc: A Pragmatic Approach to PDF Parsing and Validation Caradoc: PDF解析和验证的实用方法
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.39
Guillaume Endignoux, O. Levillain, Jean-Yves Migeon
PDF has become a de facto standard for exchanging electronic documents, for visualization as well as for printing. However, it has also become a common delivery channel for malware, and previous work has highlighted features that lead to security issues. In our work, we focus on the structure of the format, independently from specific features. By methodically testing PDF readers against hand-crafted files, we show that the interpretation of PDF files at the structural level may cause some form of denial of service, or be ambiguous and lead to rendering inconsistencies among readers. We then propose a pragmatic solution by restricting the syntax to avoid common errors, and propose a formal grammar for it. We explain how data consistency can be validated at a finer-grained level using a dedicated type checker. Finally, we assess this approach on a set of real-world files and show that our proposals are realistic.
PDF已经成为交换电子文档、可视化和打印的事实上的标准。然而,它也成为恶意软件的常见传播渠道,以前的工作已经强调了导致安全问题的特性。在我们的工作中,我们专注于格式的结构,而不是特定的功能。通过系统地测试PDF阅读器与手工制作的文件,我们表明,在结构级别上对PDF文件的解释可能会导致某种形式的拒绝服务,或者是模糊的,并导致阅读器之间的呈现不一致。然后,我们提出了一个实用的解决方案,通过限制语法来避免常见错误,并提出了一个正式的语法。我们将解释如何使用专用类型检查器在更细粒度的级别上验证数据一致性。最后,我们在一组真实世界的文件上评估这种方法,并证明我们的建议是现实的。
{"title":"Caradoc: A Pragmatic Approach to PDF Parsing and Validation","authors":"Guillaume Endignoux, O. Levillain, Jean-Yves Migeon","doi":"10.1109/SPW.2016.39","DOIUrl":"https://doi.org/10.1109/SPW.2016.39","url":null,"abstract":"PDF has become a de facto standard for exchanging electronic documents, for visualization as well as for printing. However, it has also become a common delivery channel for malware, and previous work has highlighted features that lead to security issues. In our work, we focus on the structure of the format, independently from specific features. By methodically testing PDF readers against hand-crafted files, we show that the interpretation of PDF files at the structural level may cause some form of denial of service, or be ambiguous and lead to rendering inconsistencies among readers. We then propose a pragmatic solution by restricting the syntax to avoid common errors, and propose a formal grammar for it. We explain how data consistency can be validated at a finer-grained level using a dedicated type checker. Finally, we assess this approach on a set of real-world files and show that our proposals are realistic.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware 重包装恶意软件高精度分类的代码异构性分析
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.33
K. Tian, D. Yao, B. Ryder, Gang Tan
During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification techniques, partly because of their behavioral similarities to benign apps. By exploring the app's internal different behaviors, we propose a new Android repackaged malware detection technique based on code heterogeneity analysis. Our solution strategically partitions the code structure of an app into multiple dependence-based regions (subsets of the code). Each region is independently classified on its behavioral features. We point out the security challenges and design choices for partitioning code structures at the class and method level graphs, and present a solution based on multiple dependence relations. We have performed experimental evaluation with over 7,542 Android apps. For repackaged malware, our partition-based detection reduces false negatives (i.e., missed detection) by 30-fold, when compared to the non-partition-based approach. Overall, our approach achieves a false negative rate of 0.35% and a false positive rate of 2.97%.
在重新打包过程中,恶意软件编写者静态地注入恶意代码并修改控制流以确保其执行。重新打包的恶意软件很难被现有的分类技术检测到,部分原因是它们的行为与良性应用程序相似。通过对应用内部不同行为的探究,提出了一种基于代码异质性分析的Android重包装恶意软件检测新技术。我们的解决方案战略性地将应用程序的代码结构划分为多个基于依赖的区域(代码子集)。每个区域根据其行为特征独立分类。指出了在类和方法级图上划分代码结构的安全挑战和设计选择,并提出了一种基于多重依赖关系的解决方案。我们对超过7542个Android应用程序进行了实验评估。对于重新打包的恶意软件,与非基于分区的方法相比,我们基于分区的检测减少了30倍的误报(即错过的检测)。总体而言,我们的方法实现了0.35%的假阴性率和2.97%的假阳性率。
{"title":"Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware","authors":"K. Tian, D. Yao, B. Ryder, Gang Tan","doi":"10.1109/SPW.2016.33","DOIUrl":"https://doi.org/10.1109/SPW.2016.33","url":null,"abstract":"During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification techniques, partly because of their behavioral similarities to benign apps. By exploring the app's internal different behaviors, we propose a new Android repackaged malware detection technique based on code heterogeneity analysis. Our solution strategically partitions the code structure of an app into multiple dependence-based regions (subsets of the code). Each region is independently classified on its behavioral features. We point out the security challenges and design choices for partitioning code structures at the class and method level graphs, and present a solution based on multiple dependence relations. We have performed experimental evaluation with over 7,542 Android apps. For repackaged malware, our partition-based detection reduces false negatives (i.e., missed detection) by 30-fold, when compared to the non-partition-based approach. Overall, our approach achieves a false negative rate of 0.35% and a false positive rate of 2.97%.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130901405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Privacy Risk Analysis Based on System Control Structures: Adapting System-Theoretic Process Analysis for Privacy Engineering 基于系统控制结构的隐私风险分析:将系统过程分析应用于隐私工程
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.15
S. Shapiro
To date, top-down efforts to evolve and structure privacy engineering knowledge have tended to reflect common systems engineering/development life cycle activities. A different approach suggests a particular need for technical analytical methods. To help address this need, this paper proposes to adapt for privacy engineering an existing technique, System-Theoretic Process Analysis (STPA), developed for safety engineering. The foundations of STPA are discussed, its security extension, STPA-Sec, is described, and modifications to STPA-Sec are proposed to produce STPA-Priv. STPA-Priv is then applied to a simple illustrative example.
迄今为止,自顶向下发展和构建隐私工程知识的努力已经倾向于反映常见的系统工程/开发生命周期活动。另一种不同的方法表明特别需要技术分析方法。为了帮助解决这一需求,本文提出了一种现有的技术,即系统理论过程分析(STPA),它是为安全工程而开发的。讨论了STPA的基础,描述了它的安全扩展STPA- sec,并提出了对STPA- sec的修改以产生STPA- priv。然后将stp - priv应用到一个简单的说明性示例中。
{"title":"Privacy Risk Analysis Based on System Control Structures: Adapting System-Theoretic Process Analysis for Privacy Engineering","authors":"S. Shapiro","doi":"10.1109/SPW.2016.15","DOIUrl":"https://doi.org/10.1109/SPW.2016.15","url":null,"abstract":"To date, top-down efforts to evolve and structure privacy engineering knowledge have tended to reflect common systems engineering/development life cycle activities. A different approach suggests a particular need for technical analytical methods. To help address this need, this paper proposes to adapt for privacy engineering an existing technique, System-Theoretic Process Analysis (STPA), developed for safety engineering. The foundations of STPA are discussed, its security extension, STPA-Sec, is described, and modifications to STPA-Sec are proposed to produce STPA-Priv. STPA-Priv is then applied to a simple illustrative example.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132075704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication 改进移动击键动态生物识别认证的性能和可用性
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.12
Faisal Alshanketi, I. Traoré, Ahmed Awad E. Ahmed
In the last few years, the number of mobile devices such as smartphones and tablets, in circulation, has increased dramatically. The primary and often only protection mechanism in these devices is authentication using a password or a Personal Identification Number (PIN). Passwords are notoriously known to be a weak authentication mechanism, no matter how complex the underlying format is. A more secure alternative option which has gained interest recently is extracting keystroke dynamic biometrics from supplied passwords for mobile authentication. In this paper, we show that using random forests classifier, improved accuracy performance can be achieved for mobile keystroke dynamic biometric authentication. We also propose a new algorithm for handling typos, which is an essential step in improving usability. We study both timing features and pressure-based features. Experimental evaluation is based on two public datasets and a third dataset collected in our lab. The best performance, obtained by combining timing and pressure features, is an Equal Error Rate (EER) of 2.3% for a population of 42 users.
在过去几年中,流通中的智能手机和平板电脑等移动设备的数量急剧增加。在这些设备中,主要且通常唯一的保护机制是使用密码或个人识别号码(PIN)进行身份验证。众所周知,无论底层格式有多复杂,密码都是一种弱的身份验证机制。一种更安全的替代方案最近引起了人们的兴趣,即从提供的移动身份验证密码中提取按键动态生物识别技术。在本文中,我们证明了使用随机森林分类器可以提高移动击键动态生物特征认证的准确性。我们还提出了一种处理错别字的新算法,这是提高可用性的重要步骤。我们研究了时序特征和基于压力的特征。实验评估基于两个公共数据集和我们实验室收集的第三个数据集。通过结合时序和压力特征获得的最佳性能是42个用户的平均错误率(EER)为2.3%。
{"title":"Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication","authors":"Faisal Alshanketi, I. Traoré, Ahmed Awad E. Ahmed","doi":"10.1109/SPW.2016.12","DOIUrl":"https://doi.org/10.1109/SPW.2016.12","url":null,"abstract":"In the last few years, the number of mobile devices such as smartphones and tablets, in circulation, has increased dramatically. The primary and often only protection mechanism in these devices is authentication using a password or a Personal Identification Number (PIN). Passwords are notoriously known to be a weak authentication mechanism, no matter how complex the underlying format is. A more secure alternative option which has gained interest recently is extracting keystroke dynamic biometrics from supplied passwords for mobile authentication. In this paper, we show that using random forests classifier, improved accuracy performance can be achieved for mobile keystroke dynamic biometric authentication. We also propose a new algorithm for handling typos, which is an essential step in improving usability. We study both timing features and pressure-based features. Experimental evaluation is based on two public datasets and a third dataset collected in our lab. The best performance, obtained by combining timing and pressure features, is an Equal Error Rate (EER) of 2.3% for a population of 42 users.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Hunting Bugs with Lévy Flight Foraging 用lsamvy Flight捕食虫子
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.9
Konstantin Böttinger
We present a new method for random testing of binary executables inspired by biology. In our approach we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time for possible vulnerabilities we generate test cases with Lévy flights in the input space. In order to dynamically adapt test generation behavior to actual path exploration performance we define a suitable measure for quality evaluation of test cases. This measure takes into account previously discovered code regions and allows us to construct a feedback mechanism. By controlling diffusivity of the test case generating Lévy processes with evaluation feedback from dynamic instrumentation we are able to define a fully self-adaptive fuzzing algorithm.
我们提出了一种受生物学启发的随机测试二进制可执行文件的新方法。在我们的方法中,我们引入了基于最优觅食数学模型的第一个模糊器。为了最小化对可能的漏洞的搜索时间,我们在输入空间中生成带有lsamvy飞行的测试用例。为了动态地调整测试生成行为以适应实际的路径探索性能,我们定义了一个合适的测试用例质量评估度量。这一措施考虑到之前发现的代码区域,并允许我们构建一个反馈机制。通过控制测试用例的扩散性,生成带有动态仪器评估反馈的lsamvy过程,我们能够定义一个完全自适应的模糊算法。
{"title":"Hunting Bugs with Lévy Flight Foraging","authors":"Konstantin Böttinger","doi":"10.1109/SPW.2016.9","DOIUrl":"https://doi.org/10.1109/SPW.2016.9","url":null,"abstract":"We present a new method for random testing of binary executables inspired by biology. In our approach we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time for possible vulnerabilities we generate test cases with Lévy flights in the input space. In order to dynamically adapt test generation behavior to actual path exploration performance we define a suitable measure for quality evaluation of test cases. This measure takes into account previously discovered code regions and allows us to construct a feedback mechanism. By controlling diffusivity of the test case generating Lévy processes with evaluation feedback from dynamic instrumentation we are able to define a fully self-adaptive fuzzing algorithm.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133244498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Is Anybody Home? Inferring Activity From Smart Home Network Traffic 有人在家吗?从智能家庭网络流量推断活动
Pub Date : 2016-05-01 DOI: 10.1109/SPW.2016.48
Bogdan Copos, K. Levitt, M. Bishop, J. Rowe
As smart home devices are introduced into our homes, security and privacy concerns are being raised. Smart home devices collect, exchange, and transmit various data about the environment of our homes. This data can not only be used to characterize a physical property but also to infer personal information about the inhabitants. One potential attack vector for smart home devices is the use of traffic classification as a source for covert channel attacks. Specifically, we are concerned with the use of traffic classification techniques for inferring events taking place within a building. In this work, we study two of the most popular smart home devices, the Nest Thermostat and the wired Nest Protect (i.e. smoke and carbon dioxide detector) and show that traffic analysis can be used to learn potentially sensitive information about the state of a smart home. Among other observations, we show that we can determine, with 88% and 67% accuracy respectively, when the thermostat transitions between the Home and Auto Away mode and vice versa, based only on network traffic originating from the device. This information may be used, for example, by an attacker to infer whether the home is occupied.
随着智能家居设备进入我们的家庭,安全和隐私问题正在引起人们的关注。智能家居设备收集、交换和传输关于我们家庭环境的各种数据。这些数据不仅可以用来描述物理财产的特征,还可以推断出居民的个人信息。智能家居设备的一个潜在攻击向量是使用流量分类作为隐蔽通道攻击的来源。具体来说,我们关注的是使用流量分类技术来推断建筑物内发生的事件。在这项工作中,我们研究了两种最流行的智能家居设备,Nest恒温器和有线Nest保护(即烟雾和二氧化碳探测器),并表明流量分析可用于了解有关智能家居状态的潜在敏感信息。在其他观察结果中,我们表明,仅基于来自设备的网络流量,我们可以确定恒温器何时在Home模式和Auto Away模式之间转换,准确率分别为88%和67%。例如,攻击者可以使用该信息来推断房屋是否被占用。
{"title":"Is Anybody Home? Inferring Activity From Smart Home Network Traffic","authors":"Bogdan Copos, K. Levitt, M. Bishop, J. Rowe","doi":"10.1109/SPW.2016.48","DOIUrl":"https://doi.org/10.1109/SPW.2016.48","url":null,"abstract":"As smart home devices are introduced into our homes, security and privacy concerns are being raised. Smart home devices collect, exchange, and transmit various data about the environment of our homes. This data can not only be used to characterize a physical property but also to infer personal information about the inhabitants. One potential attack vector for smart home devices is the use of traffic classification as a source for covert channel attacks. Specifically, we are concerned with the use of traffic classification techniques for inferring events taking place within a building. In this work, we study two of the most popular smart home devices, the Nest Thermostat and the wired Nest Protect (i.e. smoke and carbon dioxide detector) and show that traffic analysis can be used to learn potentially sensitive information about the state of a smart home. Among other observations, we show that we can determine, with 88% and 67% accuracy respectively, when the thermostat transitions between the Home and Auto Away mode and vice versa, based only on network traffic originating from the device. This information may be used, for example, by an attacker to infer whether the home is occupied.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
PRI: Privacy Preserving Inspection of Encrypted Network Traffic PRI:加密网络流量的隐私保护检查
Pub Date : 2016-04-15 DOI: 10.1109/SPW.2016.34
Liron Schiff, S. Schmid
Traffic inspection is a fundamental building block of many security solutions today. For example, to prevent the leakage or exfiltration of confidential insider information, as well as to block malicious traffic from entering the network, most enterprises today operate intrusion detection and prevention systems that inspect traffic. However, the state-of-the-art inspection systems do not reflect well the interests of the different involved autonomous roles. For example, employees in an enterprise, or a company outsourcing its network management to a specialized third party, may require that their traffic remains confidential, even from the system administrator. Moreover, the rules used by the intrusion detection system, or more generally the configuration of an online or offline anomaly detection engine, may be provided by a third party, e.g., a security research firm, and can hence constitute a critical business asset which should be kept confidential. Today, it is often believed that accounting for these additional requirements is impossible, as they contradict efficiency and effectiveness. We in this paper explore a novel approach, called Privacy Preserving Inspection (PRI), which provides a solution to this problem, by preserving privacy of traffic inspection and confidentiality of inspection rules and configurations, and e.g., also supports the flexible installation of additional Data Leak Prevention (DLP) rules specific to the company.
流量检测是当今许多安全解决方案的基本组成部分。例如,为了防止内部机密信息的泄漏或泄露,以及阻止恶意流量进入网络,现在大多数企业都使用入侵检测和防御系统来检测流量。然而,最先进的检查系统并不能很好地反映不同参与自治角色的利益。例如,企业或公司的员工将其网络管理外包给专门的第三方,可能要求他们的流量保持机密,甚至对系统管理员也是如此。此外,入侵检测系统使用的规则,或者更一般地说,在线或离线异常检测引擎的配置,可能由第三方(例如安全研究公司)提供,因此可能构成应保密的关键业务资产。今天,人们常常认为不可能考虑到这些额外的需求,因为它们与效率和效果相矛盾。我们在本文中探索了一种称为隐私保护检查(PRI)的新方法,该方法通过保护流量检查的隐私性和检查规则和配置的机密性,例如,还支持灵活安装特定于公司的额外数据泄漏预防(DLP)规则,为该问题提供了解决方案。
{"title":"PRI: Privacy Preserving Inspection of Encrypted Network Traffic","authors":"Liron Schiff, S. Schmid","doi":"10.1109/SPW.2016.34","DOIUrl":"https://doi.org/10.1109/SPW.2016.34","url":null,"abstract":"Traffic inspection is a fundamental building block of many security solutions today. For example, to prevent the leakage or exfiltration of confidential insider information, as well as to block malicious traffic from entering the network, most enterprises today operate intrusion detection and prevention systems that inspect traffic. However, the state-of-the-art inspection systems do not reflect well the interests of the different involved autonomous roles. For example, employees in an enterprise, or a company outsourcing its network management to a specialized third party, may require that their traffic remains confidential, even from the system administrator. Moreover, the rules used by the intrusion detection system, or more generally the configuration of an online or offline anomaly detection engine, may be provided by a third party, e.g., a security research firm, and can hence constitute a critical business asset which should be kept confidential. Today, it is often believed that accounting for these additional requirements is impossible, as they contradict efficiency and effectiveness. We in this paper explore a novel approach, called Privacy Preserving Inspection (PRI), which provides a solution to this problem, by preserving privacy of traffic inspection and confidentiality of inspection rules and configurations, and e.g., also supports the flexible installation of additional Data Leak Prevention (DLP) rules specific to the company.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Incremental Learner for Language-Based Anomaly Detection in XML 基于语言的XML异常检测的增量学习器
Pub Date : 2016-03-25 DOI: 10.1109/SPW.2016.35
Harald Lampesberger
The Extensible Markup Language (XML) is a complex language, and consequently, XML-based protocols are susceptible to entire classes of implicit and explicit security problems. Message formats in XML-based protocols are usually specified in XML Schema, and as a first-line defense, schema validation should reject malformed input. However, extension points in most protocol specifications break validation. Extension points are wildcards and considered best practice for loose composition, but they also enable an attacker to add unchecked content in a document, e.g., for a signature wrapping attack. This paper introduces datatyped XML visibly pushdown automata (dXVPAs) as language representation for mixed-content XML and presents an incremental learner that infers a dXVPA from example documents. The learner generalizes XML types and datatypes in terms of automaton states and transitions, and an inferred dXVPA converges to a good-enough approximation of the true language. The automaton is free from extension points and capable of stream validation, e.g., as an anomaly detector for XML-based protocols. For dealing with adversarial training data, two scenarios of poisoning are considered: a poisoning attack is either uncovered at a later time or remains hidden. Unlearning can therefore remove an identified poisoning attack from a dXVPA, and sanitization trims low-frequent states and transitions to get rid of hidden attacks. All algorithms have been evaluated in four scenarios, including a web service implemented in Apache Axis2 and Apache Rampart, where attacks have been simulated. In all scenarios, the learned automaton had zero false positives and outperformed traditional schema validation.
可扩展标记语言(XML)是一种复杂的语言,因此,基于XML的协议容易受到各种隐式和显式安全问题的影响。基于XML的协议中的消息格式通常在XML Schema中指定,作为第一道防线,模式验证应该拒绝格式错误的输入。然而,大多数协议规范中的扩展点会破坏验证。扩展点是通配符,被认为是松散组合的最佳实践,但它们也使攻击者能够在文档中添加未检查的内容,例如用于签名包装攻击。本文引入了数据类型XML可见下推自动机(dXVPA)作为混合内容XML的语言表示,并提出了一种从示例文档中推断出dXVPA的增量学习器。学习器根据自动机状态和转换对XML类型和数据类型进行一般化,推断的dxpa收敛到与真实语言足够接近的程度。该自动机没有扩展点,并且能够进行流验证,例如,作为基于xml的协议的异常检测器。为了处理对抗性训练数据,考虑了两种中毒情况:中毒攻击要么在稍后的时间被发现,要么仍然隐藏。因此,遗忘可以从dxpa中删除已识别的中毒攻击,而消毒可以修剪低频率的状态和转换,以消除隐藏的攻击。所有算法都在四个场景中进行了评估,其中包括在Apache Axis2和Apache Rampart中实现的web服务,并在其中模拟了攻击。在所有场景中,学习的自动机都没有误报,并且优于传统的模式验证。
{"title":"An Incremental Learner for Language-Based Anomaly Detection in XML","authors":"Harald Lampesberger","doi":"10.1109/SPW.2016.35","DOIUrl":"https://doi.org/10.1109/SPW.2016.35","url":null,"abstract":"The Extensible Markup Language (XML) is a complex language, and consequently, XML-based protocols are susceptible to entire classes of implicit and explicit security problems. Message formats in XML-based protocols are usually specified in XML Schema, and as a first-line defense, schema validation should reject malformed input. However, extension points in most protocol specifications break validation. Extension points are wildcards and considered best practice for loose composition, but they also enable an attacker to add unchecked content in a document, e.g., for a signature wrapping attack. This paper introduces datatyped XML visibly pushdown automata (dXVPAs) as language representation for mixed-content XML and presents an incremental learner that infers a dXVPA from example documents. The learner generalizes XML types and datatypes in terms of automaton states and transitions, and an inferred dXVPA converges to a good-enough approximation of the true language. The automaton is free from extension points and capable of stream validation, e.g., as an anomaly detector for XML-based protocols. For dealing with adversarial training data, two scenarios of poisoning are considered: a poisoning attack is either uncovered at a later time or remains hidden. Unlearning can therefore remove an identified poisoning attack from a dXVPA, and sanitization trims low-frequent states and transitions to get rid of hidden attacks. All algorithms have been evaluated in four scenarios, including a web service implemented in Apache Axis2 and Apache Rampart, where attacks have been simulated. In all scenarios, the learned automaton had zero false positives and outperformed traditional schema validation.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115786128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1