首页 > 最新文献

Proceedings 2021 Network and Distributed System Security Symposium最新文献

英文 中文
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages 针对解释语言的包管理器的供应链攻击度量
Pub Date : 2020-12-02 DOI: 10.14722/NDSS.2021.23055
Ruian Duan, Omar Alrawi, R. Kasturi, R. Elder, Brendan Saltaformaggio, Wenke Lee
Package managers have become a vital part of the modern software development process. They allow developers to reuse third-party code, share their own code, minimize their codebase, and simplify the build process. However, recent reports showed that package managers have been abused by attackers to distribute malware, posing significant security risks to developers and end-users. For example, eslint-scope, a package with millions of weekly downloads in Npm, was compromised to steal credentials from developers. To understand the security gaps and the misplaced trust that make recent supply chain attacks possible, we propose a comparative framework to qualitatively assess the functional and security features of package managers for interpreted languages. Based on qualitative assessment, we apply well-known program analysis techniques such as metadata, static, and dynamic analysis to study registry abuse. Our initial efforts found 339 new malicious packages that we reported to the registries for removal. The package manager maintainers confirmed 278 (82%) from the 339 reported packages where three of them had more than 100,000 downloads. For these packages we were issued official CVE numbers to help expedite the removal of these packages from infected victims. We outline the challenges of tailoring program analysis tools to interpreted languages and release our pipeline as a reference point for the community to build on and help in securing the software supply chain.
包管理器已经成为现代软件开发过程的重要组成部分。它们允许开发人员重用第三方代码,共享他们自己的代码,最小化他们的代码库,并简化构建过程。然而,最近的报告显示,包管理器已经被攻击者滥用来分发恶意软件,给开发人员和最终用户带来了重大的安全风险。例如,eslint-scope,一个在Npm中每周有数百万次下载量的包,就被窃取了开发者的凭证。为了理解使最近的供应链攻击成为可能的安全漏洞和错误的信任,我们提出了一个比较框架来定性地评估解释语言的包管理器的功能和安全特性。在定性评估的基础上,我们应用元数据、静态和动态分析等知名的程序分析技术来研究注册表滥用。我们最初的努力发现了339个新的恶意软件包,我们报告给注册表要求删除。包管理器维护者从339个报告的包中确认了278个(82%),其中三个包的下载量超过10万次。对于这些软件包,我们已发放了官方CVE编号,以帮助从受感染的受害者中快速移除这些软件包。我们概述了将程序分析工具裁剪为解释性语言的挑战,并发布了我们的管道,作为社区构建的参考点,并帮助确保软件供应链的安全。
{"title":"Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages","authors":"Ruian Duan, Omar Alrawi, R. Kasturi, R. Elder, Brendan Saltaformaggio, Wenke Lee","doi":"10.14722/NDSS.2021.23055","DOIUrl":"https://doi.org/10.14722/NDSS.2021.23055","url":null,"abstract":"Package managers have become a vital part of the modern software development process. They allow developers to reuse third-party code, share their own code, minimize their codebase, and simplify the build process. However, recent reports showed that package managers have been abused by attackers to distribute malware, posing significant security risks to developers and end-users. For example, eslint-scope, a package with millions of weekly downloads in Npm, was compromised to steal credentials from developers. To understand the security gaps and the misplaced trust that make recent supply chain attacks possible, we propose a comparative framework to qualitatively assess the functional and security features of package managers for interpreted languages. Based on qualitative assessment, we apply well-known program analysis techniques such as metadata, static, and dynamic analysis to study registry abuse. Our initial efforts found 339 new malicious packages that we reported to the registries for removal. The package manager maintainers confirmed 278 (82%) from the 339 reported packages where three of them had more than 100,000 downloads. For these packages we were issued official CVE numbers to help expedite the removal of these packages from infected victims. We outline the challenges of tailoring program analysis tools to interpreted languages and release our pipeline as a reference point for the community to build on and help in securing the software supply chain.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics 沃森:通过上下文语义聚合从审计日志中抽象行为
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24549
Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao
—Endpoint monitoring solutions are widely deployed in today’s enterprise environments to support advanced attack detection and investigation. These monitors continuously record system-level activities as audit logs and provide deep visibility into security incidents. Unfortunately, to recognize behaviors of interest and detect potential threats, cyber analysts face a semantic gap between low-level audit events and high-level system behaviors. To bridge this gap, existing work largely matches streams of audit logs against a knowledge base of rules that describe behaviors. However, specifying such rules heavily relies on expert knowledge. In this paper, we present W ATSON , an automated approach to abstracting behaviors by inferring and aggregating the semantics of audit events. W ATSON uncovers the semantics of events through their usage context in audit logs. By extracting behaviors as connected system operations, W ATSON then combines event semantics as the representation of behaviors. To reduce analysis workload, W ATSON further clusters semanti- cally similar behaviors and distinguishes the representatives for analyst investigation. In our evaluation against both benign and malicious behaviors, W ATSON exhibits high accuracy for behavior abstraction. Moreover, W ATSON can reduce analysis workload by two orders of magnitude for attack investigation.
端点监控解决方案广泛部署在当今的企业环境中,以支持高级攻击检测和调查。这些监视器连续地将系统级活动记录为审计日志,并提供对安全事件的深入可见性。不幸的是,为了识别感兴趣的行为和检测潜在的威胁,网络分析师面临着低级审计事件和高级系统行为之间的语义差距。为了弥补这一差距,现有的工作主要是将审计日志流与描述行为的规则知识库相匹配。然而,指定这些规则在很大程度上依赖于专家知识。在本文中,我们介绍了watson,一种通过推断和聚合审计事件的语义来抽象行为的自动化方法。watson通过审计日志中的使用上下文揭示事件的语义。通过提取行为作为连接的系统操作,watson然后将事件语义组合为行为的表示。为了减少分析工作量,watson进一步对语义上相似的行为进行聚类,并区分其代表进行分析。在我们对良性和恶意行为的评估中,watson在行为抽象方面表现出很高的准确性。此外,watson可以将攻击调查的分析工作量减少两个数量级。
{"title":"WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics","authors":"Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao","doi":"10.14722/NDSS.2021.24549","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24549","url":null,"abstract":"—Endpoint monitoring solutions are widely deployed in today’s enterprise environments to support advanced attack detection and investigation. These monitors continuously record system-level activities as audit logs and provide deep visibility into security incidents. Unfortunately, to recognize behaviors of interest and detect potential threats, cyber analysts face a semantic gap between low-level audit events and high-level system behaviors. To bridge this gap, existing work largely matches streams of audit logs against a knowledge base of rules that describe behaviors. However, specifying such rules heavily relies on expert knowledge. In this paper, we present W ATSON , an automated approach to abstracting behaviors by inferring and aggregating the semantics of audit events. W ATSON uncovers the semantics of events through their usage context in audit logs. By extracting behaviors as connected system operations, W ATSON then combines event semantics as the representation of behaviors. To reduce analysis workload, W ATSON further clusters semanti- cally similar behaviors and distinguishes the representatives for analyst investigation. In our evaluation against both benign and malicious behaviors, W ATSON exhibits high accuracy for behavior abstraction. Moreover, W ATSON can reduce analysis workload by two orders of magnitude for attack investigation.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126768985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets SpecTaint:发现幽灵小工具的推测性污点分析
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24466
Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei
Software patching is a crucial mitigation approach against Spectre-type attacks. It utilizes serialization instructions to disable speculative execution of potential Spectre gadgets in a program. Unfortunately, there are no effective solutions to detect gadgets for Spectre-type attacks. In this paper, we propose a novel Spectre gadget detection technique by enabling dynamic taint analysis on speculative execution paths. To this end, we simulate and explore speculative execution at system level (within a CPU emulator). We have implemented a prototype called SpecTaint to demonstrate the efficacy of our proposed approach. We evaluated SpecTaint on our Spectre Samples Dataset, and compared SpecTaint with existing state-of-the-art Spectre gadget detection approaches on real-world applications. Our experimental results demonstrate that SpecTaint outperforms existing methods with respect to detection precision and recall by large margins, and it also detects new Spectre gadgets in real-world applications such as Caffe and Brotli. Besides, SpecTaint significantly reduces the performance overhead after patching the detected gadgets, compared with other approaches.
软件打补丁是对付幽灵型攻击的关键缓解方法。它利用序列化指令来禁用程序中潜在的幽灵小工具的推测执行。不幸的是,没有有效的解决方案来检测小工具的幽灵型攻击。在本文中,我们提出了一种新的Spectre小工具检测技术,通过对推测执行路径进行动态污点分析。为此,我们在系统级(在CPU模拟器中)模拟和探索推测执行。我们已经实现了一个名为SpecTaint的原型,以证明我们提出的方法的有效性。我们在Spectre样本数据集上评估了SpecTaint,并将SpecTaint与现实应用中现有的最先进的Spectre小工具检测方法进行了比较。我们的实验结果表明,SpecTaint在检测精度和召回率方面优于现有的方法,并且它也可以在现实世界的应用程序(如Caffe和Brotli)中检测新的Spectre小工具。此外,与其他方法相比,SpecTaint在修补检测到的小工具后显着降低了性能开销。
{"title":"SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets","authors":"Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei","doi":"10.14722/NDSS.2021.24466","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24466","url":null,"abstract":"Software patching is a crucial mitigation approach against Spectre-type attacks. It utilizes serialization instructions to disable speculative execution of potential Spectre gadgets in a program. Unfortunately, there are no effective solutions to detect gadgets for Spectre-type attacks. In this paper, we propose a novel Spectre gadget detection technique by enabling dynamic taint analysis on speculative execution paths. To this end, we simulate and explore speculative execution at system level (within a CPU emulator). We have implemented a prototype called SpecTaint to demonstrate the efficacy of our proposed approach. We evaluated SpecTaint on our Spectre Samples Dataset, and compared SpecTaint with existing state-of-the-art Spectre gadget detection approaches on real-world applications. Our experimental results demonstrate that SpecTaint outperforms existing methods with respect to detection precision and recall by large margins, and it also detects new Spectre gadgets in real-world applications such as Caffe and Brotli. Besides, SpecTaint significantly reduces the performance overhead after patching the detected gadgets, compared with other approaches.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123012101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data FARE:在低质量标记数据下启用细粒度攻击分类
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24403
Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G Honavar, Gang Wang, Xinyu Xing
Supervised machine learning classifiers have been widely used for attack detection, but their training requires abundant high-quality labels. Unfortunately, high-quality labels are difficult to obtain in practice due to the high cost of data labeling and the constant evolution of attackers. Without such labels, it is challenging to train and deploy targeted countermeasures. In this paper, we propose FARE, a clustering method to enable fine-grained attack categorization under low-quality labels. We focus on two common issues in data labels: 1) missing labels for certain attack classes or families; and 2) only having coarsegrained labels available for different attack types. The core idea of FARE is to take full advantage of the limited labels while using the underlying data distribution to consolidate the lowquality labels. We design an ensemble model to fuse the results of multiple unsupervised learning algorithms with the given labels to mitigate the negative impact of missing classes and coarsegrained labels. We then train an input transformation network to map the input data into a low-dimensional latent space for fine-grained clustering. Using two security datasets (Android malware and network intrusion traces), we show that FARE significantly outperforms the state-of-the-art (semi-)supervised learning methods in clustering quality/correctness. Further, we perform an initial deployment of FARE by working with a large e-commerce service to detect fraudulent accounts. With realworld A/B tests and manual investigation, we demonstrate the effectiveness of FARE to catch previously-unseen frauds.
监督式机器学习分类器已广泛用于攻击检测,但其训练需要大量高质量的标签。不幸的是,由于数据标记的高成本和攻击者的不断演变,在实践中很难获得高质量的标签。没有这样的标签,训练和部署有针对性的对策是具有挑战性的。在本文中,我们提出了FARE,这是一种聚类方法,可以在低质量标签下实现细粒度攻击分类。我们关注数据标签中的两个常见问题:1)某些攻击类别或家族的标签缺失;2)对于不同的攻击类型,只有粗粒度的标签可用。FARE的核心思想是充分利用有限的标签,同时利用底层的数据分布来整合低质量的标签。我们设计了一个集成模型,将多个无监督学习算法的结果与给定的标签融合在一起,以减轻缺失类和粗粒度标签的负面影响。然后,我们训练一个输入转换网络,将输入数据映射到一个低维潜在空间,用于细粒度聚类。使用两个安全数据集(Android恶意软件和网络入侵痕迹),我们表明FARE在聚类质量/正确性方面明显优于最先进的(半)监督学习方法。此外,我们通过与大型电子商务服务合作来执行FARE的初始部署,以检测欺诈账户。通过现实世界的A/B测试和人工调查,我们证明了FARE在捕捉以前未见过的欺诈行为方面的有效性。
{"title":"FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data","authors":"Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G Honavar, Gang Wang, Xinyu Xing","doi":"10.14722/NDSS.2021.24403","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24403","url":null,"abstract":"Supervised machine learning classifiers have been widely used for attack detection, but their training requires abundant high-quality labels. Unfortunately, high-quality labels are difficult to obtain in practice due to the high cost of data labeling and the constant evolution of attackers. Without such labels, it is challenging to train and deploy targeted countermeasures. In this paper, we propose FARE, a clustering method to enable fine-grained attack categorization under low-quality labels. We focus on two common issues in data labels: 1) missing labels for certain attack classes or families; and 2) only having coarsegrained labels available for different attack types. The core idea of FARE is to take full advantage of the limited labels while using the underlying data distribution to consolidate the lowquality labels. We design an ensemble model to fuse the results of multiple unsupervised learning algorithms with the given labels to mitigate the negative impact of missing classes and coarsegrained labels. We then train an input transformation network to map the input data into a low-dimensional latent space for fine-grained clustering. Using two security datasets (Android malware and network intrusion traces), we show that FARE significantly outperforms the state-of-the-art (semi-)supervised learning methods in clustering quality/correctness. Further, we perform an initial deployment of FARE by working with a large e-commerce service to detect fraudulent accounts. With realworld A/B tests and manual investigation, we demonstrate the effectiveness of FARE to catch previously-unseen frauds.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning 基于深度强化学习的区块链激励机制自动化攻击分析
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24188
Charlie Hou, Mingxun Zhou, Yan Ji, Philip Daian, Florian Tramèr, G. Fanti, A. Juels
—Incentive mechanisms are central to the functionality of permissionless blockchains: they incentivize participants to run and secure the underlying consensus protocol. Designing incentive-compatible incentive mechanisms is notoriously challenging, however. As a result, most public blockchains today use incentive mechanisms whose security properties are poorly understood and largely untested. In this work, we propose SquirRL, a framework for using deep reinforcement learning to analyze attacks on blockchain incentive mechanisms. We demonstrate SquirRL’s power by first recovering known attacks: (1) the optimal selfish mining attack in Bitcoin [56], and (2) the Nash equilibrium in block withholding attacks [18]. We also use SquirRL to obtain several novel empirical results. First, we discover a counterintuitive flaw in the widely used rushing adversary model when applied to multi-agent Markov games with incomplete information. Second, we demonstrate that the optimal selfish mining strategy identified in [56] is actually not a Nash equilibrium in the multi-agent selfish mining setting. In fact, our results suggest (but do not prove) that when more than two competing agents engage in selfish mining, there is no profitable Nash equilibrium . This is consistent with the lack of observed selfish mining in the wild. Third, we find a novel attack on a simplified version of Ethereum’s finalization mechanism, Casper the Friendly Finality Gadget (FFG) that allows a strategic agent to amplify her rewards by up to 30% . Notably, [12] shows that honest voting is a Nash equilibrium in Casper FFG; our attack shows that when Casper FFG is composed with selfish mining, this is no longer the case. Altogether, our experiments demonstrate SquirRL’s flexibility and promise as a framework for studying attack settings that have thus far eluded theoretical and empirical understanding.
激励机制是无许可区块链功能的核心:它们激励参与者运行并保护底层共识协议。然而,设计与激励相容的激励机制是出了名的具有挑战性。因此,今天大多数公共区块链使用的激励机制的安全属性很难理解,而且在很大程度上未经测试。在这项工作中,我们提出了SquirRL,这是一个使用深度强化学习来分析区块链激励机制攻击的框架。我们通过首先恢复已知攻击来证明SquirRL的能力:(1)比特币中的最优自私挖掘攻击[56],以及(2)区块保留攻击中的纳什均衡[18]。我们还使用SquirRL获得了一些新的实证结果。首先,我们发现了在应用于不完全信息的多智能体马尔可夫对策时,广泛使用的仓促对手模型存在一个违反直觉的缺陷。其次,我们证明了[56]中确定的最优自私挖掘策略实际上不是多智能体自私挖掘设置中的纳什均衡。事实上,我们的结果表明(但没有证明),当两个以上的竞争主体从事自私的采矿时,就不存在有利可图的纳什均衡。这与野外观察到的自私采矿的缺乏是一致的。第三,我们发现了一种针对以太坊最终机制简化版本的新攻击,Casper the Friendly Finality Gadget (FFG)允许战略代理将她的奖励放大高达30%。值得注意的是,[12]表明,在Casper FFG中,诚实投票是纳什均衡;我们的攻击表明,当Casper FFG由自私的挖矿组成时,情况就不再是这样了。总之,我们的实验证明了SquirRL作为研究攻击设置的框架的灵活性和前景,这些框架迄今为止还没有得到理论和经验的理解。
{"title":"SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning","authors":"Charlie Hou, Mingxun Zhou, Yan Ji, Philip Daian, Florian Tramèr, G. Fanti, A. Juels","doi":"10.14722/NDSS.2021.24188","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24188","url":null,"abstract":"—Incentive mechanisms are central to the functionality of permissionless blockchains: they incentivize participants to run and secure the underlying consensus protocol. Designing incentive-compatible incentive mechanisms is notoriously challenging, however. As a result, most public blockchains today use incentive mechanisms whose security properties are poorly understood and largely untested. In this work, we propose SquirRL, a framework for using deep reinforcement learning to analyze attacks on blockchain incentive mechanisms. We demonstrate SquirRL’s power by first recovering known attacks: (1) the optimal selfish mining attack in Bitcoin [56], and (2) the Nash equilibrium in block withholding attacks [18]. We also use SquirRL to obtain several novel empirical results. First, we discover a counterintuitive flaw in the widely used rushing adversary model when applied to multi-agent Markov games with incomplete information. Second, we demonstrate that the optimal selfish mining strategy identified in [56] is actually not a Nash equilibrium in the multi-agent selfish mining setting. In fact, our results suggest (but do not prove) that when more than two competing agents engage in selfish mining, there is no profitable Nash equilibrium . This is consistent with the lack of observed selfish mining in the wild. Third, we find a novel attack on a simplified version of Ethereum’s finalization mechanism, Casper the Friendly Finality Gadget (FFG) that allows a strategic agent to amplify her rewards by up to 30% . Notably, [12] shows that honest voting is a Nash equilibrium in Casper FFG; our attack shows that when Casper FFG is composed with selfish mining, this is no longer the case. Altogether, our experiments demonstrate SquirRL’s flexibility and promise as a framework for studying attack settings that have thus far eluded theoretical and empirical understanding.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance 相信人群:无线见证检测基于ads - b的空中交通监视攻击
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24552
K. Jansen, Liang Niu, Nian Xue, I. Martinovic, C. Pöpper
Automatic Dependent Surveillance-Broadcast (ADS-B) has been widely adopted as the de facto standard for air-traffic surveillance. Aviation regulations require all aircraft to actively broadcast status reports containing identity, position, and movement information. However, the lack of security measures exposes ADS-B to cyberattacks by technically capable adversaries with the purpose of interfering with air safety. In this paper, we develop a non-invasive trust evaluation system to detect attacks on ADS-B-based air-traffic surveillance using real-world flight data as collected by an infrastructure of ground-based sensors. Taking advantage of the redundancy of geographically distributed sensors in a crowdsourcing manner, we implement verification tests to pursue security by wireless witnessing. At the core of our proposal is the combination of verification checks and Machine Learning (ML)-aided classification of reception patterns—such that user-collected data cross-validates the data provided by other users. Our system is non-invasive in the sense that it neither requires modifications on the deployed hardware nor the software protocols and only utilizes already available data. We demonstrate that our system can successfully detect GPS spoofing, ADS-B spoofing, and even Sybil attacks for airspaces observed by at least three benign sensors. We are further able to distinguish the type of attack, identify affected sensors, and tune our system to dynamically adapt to changing air-traffic conditions.
广播自动相关监视(ADS-B)已被广泛采用为空中交通监视的事实上的标准。航空法规要求所有飞机主动广播包含身份、位置和运动信息的状态报告。然而,由于缺乏安全措施,ADS-B容易受到技术上有能力的对手的网络攻击,目的是干扰空中安全。在本文中,我们开发了一种非侵入性信任评估系统,使用地面传感器基础设施收集的真实飞行数据来检测基于ads -b的空中交通监视的攻击。我们以众包的方式利用地理分布传感器的冗余性,实现验证测试,通过无线见证来追求安全性。我们建议的核心是验证检查和机器学习(ML)辅助接收模式分类的结合,这样用户收集的数据就可以交叉验证其他用户提供的数据。我们的系统是非侵入性的,因为它既不需要修改已部署的硬件,也不需要修改软件协议,只需要利用已有的数据。我们证明了我们的系统可以成功地检测GPS欺骗,ADS-B欺骗,甚至是至少三个良性传感器观察到的空域的Sybil攻击。我们进一步能够区分攻击类型,识别受影响的传感器,并调整我们的系统以动态适应不断变化的空中交通状况。
{"title":"Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance","authors":"K. Jansen, Liang Niu, Nian Xue, I. Martinovic, C. Pöpper","doi":"10.14722/NDSS.2021.24552","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24552","url":null,"abstract":"Automatic Dependent Surveillance-Broadcast (ADS-B) has been widely adopted as the de facto standard for air-traffic surveillance. Aviation regulations require all aircraft to actively broadcast status reports containing identity, position, and movement information. However, the lack of security measures exposes ADS-B to cyberattacks by technically capable adversaries with the purpose of interfering with air safety. In this paper, we develop a non-invasive trust evaluation system to detect attacks on ADS-B-based air-traffic surveillance using real-world flight data as collected by an infrastructure of ground-based sensors. Taking advantage of the redundancy of geographically distributed sensors in a crowdsourcing manner, we implement verification tests to pursue security by wireless witnessing. At the core of our proposal is the combination of verification checks and Machine Learning (ML)-aided classification of reception patterns—such that user-collected data cross-validates the data provided by other users. Our system is non-invasive in the sense that it neither requires modifications on the deployed hardware nor the software protocols and only utilizes already available data. We demonstrate that our system can successfully detect GPS spoofing, ADS-B spoofing, and even Sybil attacks for airspaces observed by at least three benign sensors. We are further able to distinguish the type of attack, identify affected sensors, and tune our system to dynamically adapt to changing air-traffic conditions.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ROV++: Improved Deployable Defense against BGP Hijacking ROV++:改进的可部署防御BGP劫持
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24438
Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, A. Herzberg, Bing Wang
We study and extend Route Origin Validation (ROV), the basis for the IETF defenses of interdomain routing. We focus on two important hijack attacks: subprefix hijacks and non-routed prefix hijacks. For both attacks, we show that, with partial deployment, ROV provides disappointing security benefits. We also present a new attack, superprefix hijacks, which completely circumvent ROV’s defense for non-routed prefix hijacks. We then present ROV++, a novel extension of ROV, with significantly improved security benefits even with partial adoption. For example, with uniform 5% adoption for edge ASes (ASes with no customers or peers), ROV prevents less than 5% of subprefix hijacks, while ROV++ prevents more than 90% of subprefix hijacks. ROV++ also defends well against non-routed prefix attacks and the novel superprefix attacks. We evaluated several ROV++ variants, all sharing the improvements in defense; this includes “Lite”, software-only variants, deployable with existing routers. Our evaluation is based on extensive simulations over the Internet topology. We also expose an obscure yet important aspect of BGP, much amplified by ROV: inconsistencies between the observable BGP path (control-plane) and the actual traffic flows (data-plane). These inconsistencies are highly relevant for security, and often lead to a challenge we refer to as hidden hijacks.
我们研究和扩展了路由起源验证(ROV),这是IETF防御域间路由的基础。我们关注两种重要的劫持攻击:子前缀劫持和非路由前缀劫持。对于这两种攻击,我们表明,在部分部署的情况下,ROV提供了令人失望的安全优势。我们还提出了一种新的攻击方法——超前缀劫持,它完全绕过了ROV对非路由前缀劫持的防御。然后,我们提出了ROV++,这是ROV的一种新型扩展,即使部分采用也能显著提高安全性。例如,在边缘ase(没有客户或对等体)统一采用5%的情况下,ROV可以防止不到5%的子前缀劫持,而ROV++可以防止超过90%的子前缀劫持。ROV++还可以很好地防御非路由前缀攻击和新型超前缀攻击。我们评估了几种ROV++变体,它们都分享了防御方面的改进;这包括“精简版”,即可与现有路由器一起部署的仅限软件的变体。我们的评估是基于对互联网拓扑结构的广泛模拟。我们还揭示了BGP的一个模糊但重要的方面,ROV大大放大了这一点:可观察到的BGP路径(控制平面)和实际流量(数据平面)之间的不一致性。这些不一致与安全性高度相关,并且经常导致我们称之为隐藏劫持的挑战。
{"title":"ROV++: Improved Deployable Defense against BGP Hijacking","authors":"Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, A. Herzberg, Bing Wang","doi":"10.14722/NDSS.2021.24438","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24438","url":null,"abstract":"We study and extend Route Origin Validation (ROV), the basis for the IETF defenses of interdomain routing. We focus on two important hijack attacks: subprefix hijacks and non-routed prefix hijacks. For both attacks, we show that, with partial deployment, ROV provides disappointing security benefits. We also present a new attack, superprefix hijacks, which completely circumvent ROV’s defense for non-routed prefix hijacks. We then present ROV++, a novel extension of ROV, with significantly improved security benefits even with partial adoption. For example, with uniform 5% adoption for edge ASes (ASes with no customers or peers), ROV prevents less than 5% of subprefix hijacks, while ROV++ prevents more than 90% of subprefix hijacks. ROV++ also defends well against non-routed prefix attacks and the novel superprefix attacks. We evaluated several ROV++ variants, all sharing the improvements in defense; this includes “Lite”, software-only variants, deployable with existing routers. Our evaluation is based on extensive simulations over the Internet topology. We also expose an obscure yet important aspect of BGP, much amplified by ROV: inconsistencies between the observable BGP path (control-plane) and the actual traffic flows (data-plane). These inconsistencies are highly relevant for security, and often lead to a challenge we refer to as hidden hijacks.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols BaseSpec: L3协议的基带软件和蜂窝规范的比较分析
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24365
Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim
Cellular basebands play a crucial role in mobile communication. However, it is significantly challenging to assess their security for several reasons. Manual analysis is inevitable because of the obscurity and complexity of baseband firmware; however, such analysis requires repetitive efforts to cover diverse models or versions. Automating the analysis is also non-trivial because the firmware is significantly large and contains numerous functions associated with complex cellular protocols. Therefore, existing approaches on baseband analysis are limited to only a couple of models or versions within a single vendor. In this paper, we propose a novel approach named BASESPEC, which performs a comparative analysis of baseband software and cellular specifications. By leveraging the standardized message structures in the specification, BASESPEC inspects the message structures implemented in the baseband software systematically. It requires a manual yet one-time analysis effort to determine how the message structures are embedded in target firmware. Then, BASESPEC compares the extracted message structures with those in the specification syntactically and semantically, and finally, it reports mismatches. These mismatches indicate the developer’s mistakes, which break the compliance of the baseband with the specification, or they imply potential vulnerabilities. We evaluated BASESPEC with 18 baseband firmware images of 9 models from one of the top three vendors and found hundreds of mismatches. By analyzing these mismatches, we discovered 9 erroneous cases: 5 functional errors and 4 memory-related vulnerabilities. Notably, two of these are critical remote code execution 0-days. Moreover, we applied BASESPEC to 3 models from another vendor, and BASESPEC found multiple mismatches, two of which led us to discover a buffer overflow bug.
蜂窝基带在移动通信中起着至关重要的作用。然而,由于几个原因,评估它们的安全性是非常具有挑战性的。由于基带固件的模糊性和复杂性,人工分析是不可避免的;然而,这样的分析需要重复的工作来覆盖不同的模型或版本。自动化分析也很重要,因为固件非常大,并且包含与复杂的蜂窝协议相关的许多功能。因此,现有的基带分析方法仅限于单个供应商的几个模型或版本。在本文中,我们提出了一种名为BASESPEC的新方法,该方法对基带软件和蜂窝规格进行了比较分析。通过利用规范中的标准化消息结构,BASESPEC系统地检查在基带软件中实现的消息结构。它需要一次手工分析工作来确定消息结构如何嵌入到目标固件中。然后,BASESPEC将提取的消息结构与规范中的消息结构在语法和语义上进行比较,最后报告不匹配。这些不匹配表明了开发人员的错误,这破坏了基带与规范的一致性,或者它们暗示了潜在的漏洞。我们使用来自前三大供应商之一的9个型号的18个基带固件映像对BASESPEC进行了评估,发现了数百个不匹配。通过分析这些不匹配,我们发现了9个错误案例:5个功能错误和4个内存相关漏洞。值得注意的是,其中两个是关键的远程代码执行0天。此外,我们将BASESPEC应用于来自另一个供应商的3个模型,BASESPEC发现了多个不匹配,其中两个导致我们发现了缓冲区溢出错误。
{"title":"BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols","authors":"Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim","doi":"10.14722/NDSS.2021.24365","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24365","url":null,"abstract":"Cellular basebands play a crucial role in mobile communication. However, it is significantly challenging to assess their security for several reasons. Manual analysis is inevitable because of the obscurity and complexity of baseband firmware; however, such analysis requires repetitive efforts to cover diverse models or versions. Automating the analysis is also non-trivial because the firmware is significantly large and contains numerous functions associated with complex cellular protocols. Therefore, existing approaches on baseband analysis are limited to only a couple of models or versions within a single vendor. In this paper, we propose a novel approach named BASESPEC, which performs a comparative analysis of baseband software and cellular specifications. By leveraging the standardized message structures in the specification, BASESPEC inspects the message structures implemented in the baseband software systematically. It requires a manual yet one-time analysis effort to determine how the message structures are embedded in target firmware. Then, BASESPEC compares the extracted message structures with those in the specification syntactically and semantically, and finally, it reports mismatches. These mismatches indicate the developer’s mistakes, which break the compliance of the baseband with the specification, or they imply potential vulnerabilities. We evaluated BASESPEC with 18 baseband firmware images of 9 models from one of the top three vendors and found hundreds of mismatches. By analyzing these mismatches, we discovered 9 erroneous cases: 5 functional errors and 4 memory-related vulnerabilities. Notably, two of these are critical remote code execution 0-days. Moreover, we applied BASESPEC to 3 models from another vendor, and BASESPEC found multiple mismatches, two of which led us to discover a buffer overflow bug.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131908289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks 你的手机是我的代理:检测和理解移动代理网络
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24008
Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, Xiaofeng Wang
Residential proxy has emerged as a service gaining popularity recently, in which proxy providers relay their customers’ network traffic through millions of proxy peers under their control. We find that many of these proxy peers are mobile devices, whose role in the proxy network can have significant security implications since mobile devices tend to be privacyand resource-sensitive. However, little effort has been made so far to understand the extent of their involvement, not to mention how these devices are recruited by the proxy network and what security and privacy risks they may pose. In this paper, we report the first measurement study on the mobile proxy ecosystem. Our study was made possible by a novel measurement infrastructure, which enabled us to identify proxy providers, to discover proxy SDKs (software development kits), to detect Android proxy apps built upon the proxy SDKs, to harvest proxy IP addresses, and to understand proxy traffic. The information collected through this infrastructure has brought to us new understandings of this ecosystem and important security discoveries. More specifically, 4 proxy providers were found to offer app developers mobile proxy SDKs as a competitive app monetization channel, with $50K per month per 1M MAU (monthly active users). 1,701 Android APKs (belonging to 963 Android apps) turn out to have integrated those proxy SDKs, with most of them available on Google Play with at least 300M installations in total. Furthermore, 48.43% of these APKs are flagged by at least 5 anti-virus engines as malicious, which could explain why 86.60% of the 963 Android apps have been removed from Google Play by Oct 2019. Besides, while these apps display user consent dialogs on traffic relay, our user study indicates that the user consent texts are quite confusing. We even discover a proxy SDK that stealthily relays traffic without showing any notifications. We also captured 625K cellular proxy IPs, along with a set of suspicious activities observed in proxy traffic such as ads fraud. We have reported our findings to affected parties, offered suggestions, and proposed the methodologies to detect proxy apps and proxy traffic. ∗Corresponding author
住宅代理是最近兴起的一种服务,代理提供商通过其控制下的数百万代理节点来传递客户的网络流量。我们发现这些代理对等体中的许多都是移动设备,它们在代理网络中的角色可能具有重要的安全含义,因为移动设备往往是隐私和资源敏感的。然而,到目前为止,几乎没有人努力了解他们的参与程度,更不用说这些设备是如何被代理网络招募的,以及它们可能带来的安全和隐私风险。本文首次对移动代理生态系统进行了测量研究。我们的研究是通过一种新的测量基础设施实现的,它使我们能够识别代理提供商,发现代理sdk(软件开发工具包),检测基于代理sdk构建的Android代理应用程序,获取代理IP地址,并了解代理流量。通过这个基础设施收集的信息使我们对这个生态系统和重要的安全发现有了新的认识。更具体地说,我们发现有4家代理提供商向应用开发者提供手机代理sdk,作为一种竞争性的应用盈利渠道,每100万MAU(月活跃用户)每月可获得5万美元。结果显示,共有1701个Android apk(属于963个Android应用)集成了这些代理sdk,其中大多数应用在Google Play上的安装量至少达到3亿次。此外,这些apk中有48.43%被至少5个反病毒引擎标记为恶意,这可以解释为什么到2019年10月,963个Android应用中有86.60%已从Google Play下架。此外,虽然这些应用程序在流量中继上显示用户同意对话框,但我们的用户研究表明,用户同意文本相当混乱。我们甚至发现了一个代理SDK,它可以在不显示任何通知的情况下偷偷地中继流量。我们还捕获了625K蜂窝代理ip,以及在代理流量中观察到的一系列可疑活动,如广告欺诈。我们已经向受影响的各方报告了我们的发现,提出了建议,并提出了检测代理应用程序和代理流量的方法。∗通讯作者
{"title":"Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks","authors":"Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, Xiaofeng Wang","doi":"10.14722/NDSS.2021.24008","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24008","url":null,"abstract":"Residential proxy has emerged as a service gaining popularity recently, in which proxy providers relay their customers’ network traffic through millions of proxy peers under their control. We find that many of these proxy peers are mobile devices, whose role in the proxy network can have significant security implications since mobile devices tend to be privacyand resource-sensitive. However, little effort has been made so far to understand the extent of their involvement, not to mention how these devices are recruited by the proxy network and what security and privacy risks they may pose. In this paper, we report the first measurement study on the mobile proxy ecosystem. Our study was made possible by a novel measurement infrastructure, which enabled us to identify proxy providers, to discover proxy SDKs (software development kits), to detect Android proxy apps built upon the proxy SDKs, to harvest proxy IP addresses, and to understand proxy traffic. The information collected through this infrastructure has brought to us new understandings of this ecosystem and important security discoveries. More specifically, 4 proxy providers were found to offer app developers mobile proxy SDKs as a competitive app monetization channel, with $50K per month per 1M MAU (monthly active users). 1,701 Android APKs (belonging to 963 Android apps) turn out to have integrated those proxy SDKs, with most of them available on Google Play with at least 300M installations in total. Furthermore, 48.43% of these APKs are flagged by at least 5 anti-virus engines as malicious, which could explain why 86.60% of the 963 Android apps have been removed from Google Play by Oct 2019. Besides, while these apps display user consent dialogs on traffic relay, our user study indicates that the user consent texts are quite confusing. We even discover a proxy SDK that stealthily relays traffic without showing any notifications. We also captured 625K cellular proxy IPs, along with a set of suspicious activities observed in proxy traffic such as ads fraud. We have reported our findings to affected parties, offered suggestions, and proposed the methodologies to detect proxy apps and proxy traffic. ∗Corresponding author","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124220537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs 对抗性程序下的高效多客户端隔离
Pub Date : 1900-01-01 DOI: 10.14722/NDSS.2021.24057
Adil Ahmad, Juhee Kim, Jaebaek Seo, I. Shin, Pedro Fonseca, Byoungyoung Lee
Intel SGX aims to provide the confidentiality of user data on untrusted cloud machines. However, applications that process confidential user data may contain bugs that leak information or be programmed maliciously to collect user data. Existing research that attempts to solve this problem does not consider multi-client isolation in a single enclave. We show that by not supporting such in-enclave isolation, they incur considerable slowdown when concurrently processing multiple clients in different enclave processes, due to the limitations of SGX. This paper proposes CHANCEL, a sandbox designed for multi-client isolation within a single SGX enclave. In particular, CHANCEL allows a program’s threads to access both a per-thread memory region and a shared read-only memory region while servicing requests. Each thread handles requests from a single client at a time and is isolated from other threads, using a MultiClient Software Fault Isolation (MCSFI) scheme. Furthermore, CHANCEL supports various in-enclave services such as an inmemory file system and shielded client communication to ensure complete mediation of the program’s interactions with the outside world. We implemented CHANCEL and evaluated it on SGX hardware using both micro-benchmarks and realistic target scenarios, including private information retrieval and product recommendation services. Our results show that CHANCEL outperforms a baseline multi-process sandbox by 4.06− 53.70× on micro-benchmarks and 0.02−21.18× on realistic workloads while providing strong security guarantees.
英特尔SGX旨在为不受信任的云计算机上的用户数据提供保密性。但是,处理机密用户数据的应用程序可能包含泄露信息或被恶意编程以收集用户数据的错误。试图解决此问题的现有研究没有考虑单个飞地中的多客户机隔离。我们表明,由于SGX的限制,由于不支持这种enclave内隔离,当在不同的enclave进程中并发处理多个客户机时,它们会导致相当大的速度减慢。本文提出了chanel,这是一个沙盒,用于在单个SGX飞地内进行多客户端隔离。特别地,CHANCEL允许程序的线程在处理请求时访问每个线程的内存区域和共享只读内存区域。每个线程一次处理来自单个客户机的请求,并使用多客户机软件故障隔离(MCSFI)方案与其他线程隔离。此外,CHANCEL支持各种包内服务,如内存文件系统和屏蔽客户端通信,以确保程序与外部世界交互的完整中介。我们实现了CHANCEL,并在SGX硬件上使用微基准测试和现实目标场景(包括私人信息检索和产品推荐服务)对其进行了评估。我们的结果表明,在提供强大的安全保证的同时,CHANCEL在微基准测试中比基准多进程沙盒性能高4.06 - 53.70倍,在实际工作负载上比基准多进程沙盒性能高0.02 - 21.18倍。
{"title":"CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs","authors":"Adil Ahmad, Juhee Kim, Jaebaek Seo, I. Shin, Pedro Fonseca, Byoungyoung Lee","doi":"10.14722/NDSS.2021.24057","DOIUrl":"https://doi.org/10.14722/NDSS.2021.24057","url":null,"abstract":"Intel SGX aims to provide the confidentiality of user data on untrusted cloud machines. However, applications that process confidential user data may contain bugs that leak information or be programmed maliciously to collect user data. Existing research that attempts to solve this problem does not consider multi-client isolation in a single enclave. We show that by not supporting such in-enclave isolation, they incur considerable slowdown when concurrently processing multiple clients in different enclave processes, due to the limitations of SGX. This paper proposes CHANCEL, a sandbox designed for multi-client isolation within a single SGX enclave. In particular, CHANCEL allows a program’s threads to access both a per-thread memory region and a shared read-only memory region while servicing requests. Each thread handles requests from a single client at a time and is isolated from other threads, using a MultiClient Software Fault Isolation (MCSFI) scheme. Furthermore, CHANCEL supports various in-enclave services such as an inmemory file system and shielded client communication to ensure complete mediation of the program’s interactions with the outside world. We implemented CHANCEL and evaluated it on SGX hardware using both micro-benchmarks and realistic target scenarios, including private information retrieval and product recommendation services. Our results show that CHANCEL outperforms a baseline multi-process sandbox by 4.06− 53.70× on micro-benchmarks and 0.02−21.18× on realistic workloads while providing strong security guarantees.","PeriodicalId":364091,"journal":{"name":"Proceedings 2021 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125703597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
Proceedings 2021 Network and Distributed System Security Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1