首页 > 最新文献

Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy最新文献

英文 中文
SDN Research Challenges and Opportunities SDN研究的挑战与机遇
A. Nikolich
The National Science Foundation has made investments in Software Defined Networking (SDN) and Network Function Virtualization (NFV) for many years, in both the research and infrastructure areas. SDN and NFV enable systems to become more open to transformative research, with implications for revolutionary new applications and services. Additionally, the emerging concept of Software-Defined Exchanges will enable large-scale interconnection of Software Defined infrastructures, owned and operated by many different organizations, to provide logically isolated 'on demand' global scale infrastructure on an end-to-end basis, with enhanced flexibility and security for new applications. This talk will examine past NSF investments and successes in SDN/NFV, identify new research opportunities available to the community and present challenges that need to be overcome to make SDN/NFV a reality in operational cyberinfrastructure.
美国国家科学基金会多年来一直在软件定义网络(SDN)和网络功能虚拟化(NFV)的研究和基础设施领域进行投资。SDN和NFV使系统对变革性研究更加开放,从而产生革命性的新应用和服务。此外,新兴的软件定义交换概念将实现由许多不同组织拥有和运营的软件定义基础设施的大规模互连,在端到端基础上提供逻辑上隔离的“按需”全球规模基础设施,并为新应用程序增强灵活性和安全性。本次演讲将回顾过去NSF在SDN/NFV方面的投资和成功,确定社区可用的新研究机会,以及当前需要克服的挑战,以使SDN/NFV在运营网络基础设施中成为现实。
{"title":"SDN Research Challenges and Opportunities","authors":"A. Nikolich","doi":"10.1145/2857705.2857730","DOIUrl":"https://doi.org/10.1145/2857705.2857730","url":null,"abstract":"The National Science Foundation has made investments in Software Defined Networking (SDN) and Network Function Virtualization (NFV) for many years, in both the research and infrastructure areas. SDN and NFV enable systems to become more open to transformative research, with implications for revolutionary new applications and services. Additionally, the emerging concept of Software-Defined Exchanges will enable large-scale interconnection of Software Defined infrastructures, owned and operated by many different organizations, to provide logically isolated 'on demand' global scale infrastructure on an end-to-end basis, with enhanced flexibility and security for new applications. This talk will examine past NSF investments and successes in SDN/NFV, identify new research opportunities available to the community and present challenges that need to be overcome to make SDN/NFV a reality in operational cyberinfrastructure.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Malicious Exploit Kits using Tree-based Similarity Searches 使用基于树的相似度搜索检测恶意漏洞工具包
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, M. Stoecklin, F. Monrose, R. Sailer
Unfortunately, the computers we use for everyday activities can be infiltrated while simply browsing innocuous sites that, unbeknownst to the website owner, may be laden with malicious advertisements. So-called malvertising, redirects browsers to web-based exploit kits that are designed to find vulnerabilities in the browser and subsequently download malicious payloads. We propose a new approach for detecting such malfeasance by leveraging the inherent structural patterns in HTTP traffic to classify exploit kit instances. Our key insight is that an exploit kit leads the browser to download payloads using multiple requests from malicious servers. We capture these interactions in a "tree-like" form, and using a scalable index of malware samples, model the detection process as a subtree similarity search problem. The approach is evaluated on 3800 hours of real-world traffic including over 4 billion flows and reduces false positive rates by four orders of magnitude over current state-of-the-art techniques with comparable true positive rates. We show that our approach can operate in near real-time, and is able to handle peak traffic levels on a large enterprise network --- identifying 28 new exploit kit instances during our analysis period.
不幸的是,我们用于日常活动的电脑可能在浏览无害网站时被渗透,而网站所有者却不知道,这些网站可能装满了恶意广告。所谓的恶意广告,将浏览器重定向到基于web的漏洞利用工具包,这些工具包旨在找到浏览器中的漏洞,随后下载恶意有效载荷。我们提出了一种新的方法,通过利用HTTP流量中固有的结构模式来对漏洞利用工具包实例进行分类,从而检测此类不法行为。我们的关键洞察是,利用工具包引导浏览器使用来自恶意服务器的多个请求下载有效负载。我们以“树状”形式捕获这些交互,并使用可扩展的恶意软件样本索引,将检测过程建模为子树相似度搜索问题。该方法在3800小时的真实流量中进行了评估,其中包括超过40亿流量,与目前具有可比真阳性率的最先进技术相比,它将假阳性率降低了四个数量级。我们表明,我们的方法可以近乎实时地运行,并且能够处理大型企业网络上的高峰流量水平——在我们的分析期间确定了28个新的漏洞利用工具包实例。
{"title":"Detecting Malicious Exploit Kits using Tree-based Similarity Searches","authors":"Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, M. Stoecklin, F. Monrose, R. Sailer","doi":"10.1145/2857705.2857718","DOIUrl":"https://doi.org/10.1145/2857705.2857718","url":null,"abstract":"Unfortunately, the computers we use for everyday activities can be infiltrated while simply browsing innocuous sites that, unbeknownst to the website owner, may be laden with malicious advertisements. So-called malvertising, redirects browsers to web-based exploit kits that are designed to find vulnerabilities in the browser and subsequently download malicious payloads. We propose a new approach for detecting such malfeasance by leveraging the inherent structural patterns in HTTP traffic to classify exploit kit instances. Our key insight is that an exploit kit leads the browser to download payloads using multiple requests from malicious servers. We capture these interactions in a \"tree-like\" form, and using a scalable index of malware samples, model the detection process as a subtree similarity search problem. The approach is evaluated on 3800 hours of real-world traffic including over 4 billion flows and reduces false positive rates by four orders of magnitude over current state-of-the-art techniques with comparable true positive rates. We show that our approach can operate in near real-time, and is able to handle peak traffic levels on a large enterprise network --- identifying 28 new exploit kit instances during our analysis period.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128451899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Risk-based Analysis of Business Process Executions 基于风险的业务流程执行分析
M. Alizadeh, Nicola Zannone
Organizations need to monitor their business processes to ensure that what actually happens in the system is compliant with the prescribed behavior. Deviations from the prescribed behavior may correspond to violations of security requirements and expose organizations to severe risks. Thus, it is crucial for organizations to detect and address nonconforming behavior as early as possible. In this paper, we present an auditing framework that facilitates the analysis of process executions by detecting nonconforming behaviors and ranking them with respect to their criticality. Our framework employs conformance checking techniques to detect possible explanations of nonconformity. Based on such explanations, the framework assesses the criticality of nonconforming process executions based on historical logging data and context information.
组织需要监视他们的业务流程,以确保系统中实际发生的事情符合规定的行为。对规定行为的偏离可能对应于对安全需求的违反,并使组织暴露于严重的风险中。因此,组织尽早发现和处理不符合行为是至关重要的。在本文中,我们提出了一个审核框架,该框架通过检测不符合行为并根据其严重性对其进行排序来促进过程执行的分析。我们的框架采用一致性检查技术来检测不一致性的可能解释。基于这些解释,该框架基于历史日志数据和上下文信息评估不符合过程执行的严重性。
{"title":"Risk-based Analysis of Business Process Executions","authors":"M. Alizadeh, Nicola Zannone","doi":"10.1145/2857705.2857742","DOIUrl":"https://doi.org/10.1145/2857705.2857742","url":null,"abstract":"Organizations need to monitor their business processes to ensure that what actually happens in the system is compliant with the prescribed behavior. Deviations from the prescribed behavior may correspond to violations of security requirements and expose organizations to severe risks. Thus, it is crucial for organizations to detect and address nonconforming behavior as early as possible. In this paper, we present an auditing framework that facilitates the analysis of process executions by detecting nonconforming behaviors and ranking them with respect to their criticality. Our framework employs conformance checking techniques to detect possible explanations of nonconformity. Based on such explanations, the framework assesses the criticality of nonconforming process executions based on historical logging data and context information.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"10 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows 溯源工作流中顺序关联规则的隐私保护挖掘
Mihai Maruseac, Gabriel Ghinita
Provenance workflows capture movement and transformation of data in complex environments, such as document management in large organizations, content generation and sharing in in social media, scientific computations, etc. Sharing and processing of provenance workflows brings numerous benefits, e.g., improving productivity in an organization, understanding social media interaction patterns, etc. However, directly sharing provenance may also disclose sensitive information such as confidential business practices, or private details about participants in a social network. We propose an algorithm that privately extracts sequential association rules from provenance workflow datasets. Finding such rules has numerous practical applications, such as capacity planning or identifying hot-spots in provenance graphs. Our approach provides good accuracy and strong privacy, by leveraging on the exponential mechanism of differential privacy. We propose an heuristic that identifies promising candidate rules and makes judicious use of the privacy budget. Experimental results show that the our approach is fast and accurate, and clearly outperforms the state-of-the-art. We also identify influential factors in improving accuracy, which helps in choosing promising directions for future improvement.
来源工作流捕获复杂环境中数据的移动和转换,例如大型组织中的文档管理、社交媒体中的内容生成和共享、科学计算等。来源工作流的共享和处理带来了许多好处,例如,提高组织的生产力,理解社会媒体交互模式,等等。然而,直接共享来源也可能会泄露敏感信息,如机密的商业惯例,或社交网络参与者的私人细节。提出了一种从溯源工作流数据集中提取顺序关联规则的算法。查找此类规则有许多实际应用,例如容量规划或识别来源图中的热点。我们的方法利用差分隐私的指数机制,提供了良好的准确性和强隐私性。我们提出了一种启发式方法来识别有希望的候选规则,并明智地使用隐私预算。实验结果表明,该方法快速、准确,明显优于现有方法。我们还确定了提高准确性的影响因素,这有助于为未来的改进选择有希望的方向。
{"title":"Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows","authors":"Mihai Maruseac, Gabriel Ghinita","doi":"10.1145/2857705.2857743","DOIUrl":"https://doi.org/10.1145/2857705.2857743","url":null,"abstract":"Provenance workflows capture movement and transformation of data in complex environments, such as document management in large organizations, content generation and sharing in in social media, scientific computations, etc. Sharing and processing of provenance workflows brings numerous benefits, e.g., improving productivity in an organization, understanding social media interaction patterns, etc. However, directly sharing provenance may also disclose sensitive information such as confidential business practices, or private details about participants in a social network. We propose an algorithm that privately extracts sequential association rules from provenance workflow datasets. Finding such rules has numerous practical applications, such as capacity planning or identifying hot-spots in provenance graphs. Our approach provides good accuracy and strong privacy, by leveraging on the exponential mechanism of differential privacy. We propose an heuristic that identifies promising candidate rules and makes judicious use of the privacy budget. Experimental results show that the our approach is fast and accurate, and clearly outperforms the state-of-the-art. We also identify influential factors in improving accuracy, which helps in choosing promising directions for future improvement.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130928485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable and Secure Logistic Regression via Homomorphic Encryption 基于同态加密的可扩展和安全逻辑回归
Yoshinori Aono, Takuya Hayashi, L. T. Phong, Lihua Wang
Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive data such as private or medical information, cares are necessary. In this paper, we propose a secure system for protecting the training data in logistic regression via homomorphic encryption. Perhaps surprisingly, despite the non-polynomial tasks of training in logistic regression, we show that only additively homomorphic encryption is needed to build our system. Our system is secure and scalable with the dataset size.
逻辑回归是一种功能强大的机器学习数据分类工具。在处理敏感数据(如私人或医疗信息)时,需要注意。本文提出了一种基于同态加密的逻辑回归训练数据安全保护系统。也许令人惊讶的是,尽管在逻辑回归中训练的任务是非多项式的,但我们表明只需要加性同态加密来构建我们的系统。我们的系统是安全和可扩展的数据集大小。
{"title":"Scalable and Secure Logistic Regression via Homomorphic Encryption","authors":"Yoshinori Aono, Takuya Hayashi, L. T. Phong, Lihua Wang","doi":"10.1145/2857705.2857731","DOIUrl":"https://doi.org/10.1145/2857705.2857731","url":null,"abstract":"Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive data such as private or medical information, cares are necessary. In this paper, we propose a secure system for protecting the training data in logistic regression via homomorphic encryption. Perhaps surprisingly, despite the non-polynomial tasks of training in logistic regression, we show that only additively homomorphic encryption is needed to build our system. Our system is secure and scalable with the dataset size.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 161
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities 从联邦在线身份构建保护隐私的加密凭证
John Maheswaran, Daniel Jackowitz, Ennan Zhai, D. Wolinsky, B. Ford
Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authentications carry privacy and tracking risks. For example, federated identity providers can learn what applications users are accessing; meanwhile, the applications can know the users' identities in reality. This paper presents Crypto-Book, an anonymizing layer enabling federated identity authentications while preventing these risks. Crypto-Book uses a set of independently managed servers that employ a (t,n)-threshold cryptosystem to collectively assign credentials to each federated identity (in the form of either a public/private keypair or blinded signed messages). With the credentials in hand, clients can then leverage anonymous authentication techniques such as linkable ring signatures or partially blind signatures to log into third-party applications in an anonymous yet accountable way. We have implemented a prototype of Crypto-Book and demonstrated its use with three applications: a Wiki system, an anonymous group communication system, and a whistleblower submission system. Crypto-Book is practical and has low overhead: in a deployment within our research group, Crypto-Book group authentication took 1.607s end-to-end, an overhead of 1.2s compared to traditional non-privacy-preserving federated authentication.
联合身份提供商,例如Facebook和PayPal,为第三方应用程序验证用户提供了一种方便的方法。不幸的是,这种跨站点身份验证存在隐私和跟踪风险。例如,联邦身份提供者可以了解用户正在访问哪些应用程序;同时,应用程序可以在现实中了解用户的身份。本文提出了Crypto-Book,这是一个匿名层,可以在防止这些风险的同时进行联邦身份认证。Crypto-Book使用一组独立管理的服务器,这些服务器采用(t,n)阈值密码系统,共同为每个联邦身份分配凭据(以公共/私有对或盲签名消息的形式)。有了凭据,客户端就可以利用匿名身份验证技术,如可链接的环签名或部分盲签名,以匿名但可负责的方式登录到第三方应用程序。我们已经实现了Crypto-Book的原型,并通过三个应用程序演示了它的使用:Wiki系统,匿名组通信系统和举报人提交系统。Crypto-Book实用且开销低:在我们研究小组的部署中,Crypto-Book组身份验证端到端耗时1.607秒,与传统的非隐私保护联邦身份验证相比,开销为1.2秒。
{"title":"Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities","authors":"John Maheswaran, Daniel Jackowitz, Ennan Zhai, D. Wolinsky, B. Ford","doi":"10.1145/2857705.2857725","DOIUrl":"https://doi.org/10.1145/2857705.2857725","url":null,"abstract":"Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authentications carry privacy and tracking risks. For example, federated identity providers can learn what applications users are accessing; meanwhile, the applications can know the users' identities in reality. This paper presents Crypto-Book, an anonymizing layer enabling federated identity authentications while preventing these risks. Crypto-Book uses a set of independently managed servers that employ a (t,n)-threshold cryptosystem to collectively assign credentials to each federated identity (in the form of either a public/private keypair or blinded signed messages). With the credentials in hand, clients can then leverage anonymous authentication techniques such as linkable ring signatures or partially blind signatures to log into third-party applications in an anonymous yet accountable way. We have implemented a prototype of Crypto-Book and demonstrated its use with three applications: a Wiki system, an anonymous group communication system, and a whistleblower submission system. Crypto-Book is practical and has low overhead: in a deployment within our research group, Crypto-Book group authentication took 1.607s end-to-end, an overhead of 1.2s compared to traditional non-privacy-preserving federated authentication.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123007560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hacking the DBMS to Prevent Injection Attacks 破解DBMS以防止注入攻击
Ibéria Medeiros, Miguel Beatriz, N. Neves, M. Correia
After more than a decade of research, web application security continues to be a challenge and the backend database the most appetizing target. The paper proposes preventing injection attacks against the database management system (DBMS) behind web applications by embedding protections in the DBMS itself. The motivation is twofold. First, the approach of embedding protections in operating systems and applications running on top of them has been effective to protect this software. Second, there is a semantic mismatch between how SQL queries are believed to be executed by the DBMS and how they are actually executed, leading to subtle vulnerabilities in prevention mechanisms. The approach -- SEPTIC -- was implemented in MySQL and evaluated experimentally with web applications written in PHP and Java/Spring. In the evaluation SEPTIC has shown neither false negatives nor false positives, on the contrary of alternative approaches, causing also a low performance overhead in the order of 2.2%.
经过十多年的研究,web应用程序安全仍然是一个挑战,后端数据库是最诱人的目标。本文提出通过在数据库管理系统(DBMS)本身中嵌入保护措施来防止对web应用程序背后的数据库管理系统(DBMS)的注入攻击。动机是双重的。首先,在操作系统和运行在其上的应用程序中嵌入保护的方法已经有效地保护了该软件。其次,在DBMS所相信的SQL查询的执行方式和它们的实际执行方式之间存在语义不匹配,这导致了预防机制中的微妙漏洞。该方法——SEPTIC——是在MySQL中实现的,并在用PHP和Java/Spring编写的web应用程序中进行了实验性评估。在评估中,与其他方法相反,SEPTIC既没有显示出假阴性,也没有显示出假阳性,这也导致了2.2%的低性能开销。
{"title":"Hacking the DBMS to Prevent Injection Attacks","authors":"Ibéria Medeiros, Miguel Beatriz, N. Neves, M. Correia","doi":"10.1145/2857705.2857723","DOIUrl":"https://doi.org/10.1145/2857705.2857723","url":null,"abstract":"After more than a decade of research, web application security continues to be a challenge and the backend database the most appetizing target. The paper proposes preventing injection attacks against the database management system (DBMS) behind web applications by embedding protections in the DBMS itself. The motivation is twofold. First, the approach of embedding protections in operating systems and applications running on top of them has been effective to protect this software. Second, there is a semantic mismatch between how SQL queries are believed to be executed by the DBMS and how they are actually executed, leading to subtle vulnerabilities in prevention mechanisms. The approach -- SEPTIC -- was implemented in MySQL and evaluated experimentally with web applications written in PHP and Java/Spring. In the evaluation SEPTIC has shown neither false negatives nor false positives, on the contrary of alternative approaches, causing also a low performance overhead in the order of 2.2%.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack 云虚拟化基础设施合规性审计:OpenStack应用
Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, M. Pourzandi, Lingyu Wang
Cloud service providers typically adopt the multi-tenancy model to optimize resources usage and achieve the promised cost-effectiveness. Sharing resources between different tenants and the underlying complex technology increase the necessity of transparency and accountability. In this regard, auditing security compliance of the provider's infrastructure against standards, regulations and customers' policies takes on an increasing importance in the cloud to boost the trust between the stakeholders. However, virtualization and scalability make compliance verification challenging. In this work, we propose an automated framework that allows auditing the cloud infrastructure from the structural point of view while focusing on virtualization-related security properties and consistency between multiple control layers. Furthermore, to show the feasibility of our approach, we integrate our auditing system into OpenStack, one of the most used cloud infrastructure management systems. To show the scalability and validity of our framework, we present our experimental results on assessing several properties related to auditing inter-layer consistency, virtual machines co-residence, and virtual resources isolation.
云服务提供商通常采用多租户模型来优化资源使用并实现承诺的成本效益。不同租户之间的资源共享和底层复杂的技术增加了透明度和问责制的必要性。在这方面,根据标准、法规和客户的策略审计提供商基础设施的安全遵从性在云中变得越来越重要,以增强利益相关者之间的信任。然而,虚拟化和可伸缩性使遵从性验证具有挑战性。在这项工作中,我们提出了一个自动化框架,允许从结构的角度审计云基础设施,同时关注与虚拟化相关的安全属性和多个控制层之间的一致性。此外,为了展示我们方法的可行性,我们将我们的审计系统集成到OpenStack中,OpenStack是最常用的云基础设施管理系统之一。为了展示我们框架的可伸缩性和有效性,我们给出了评估与审计层间一致性、虚拟机共存和虚拟资源隔离相关的几个属性的实验结果。
{"title":"Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack","authors":"Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, M. Pourzandi, Lingyu Wang","doi":"10.1145/2857705.2857721","DOIUrl":"https://doi.org/10.1145/2857705.2857721","url":null,"abstract":"Cloud service providers typically adopt the multi-tenancy model to optimize resources usage and achieve the promised cost-effectiveness. Sharing resources between different tenants and the underlying complex technology increase the necessity of transparency and accountability. In this regard, auditing security compliance of the provider's infrastructure against standards, regulations and customers' policies takes on an increasing importance in the cloud to boost the trust between the stakeholders. However, virtualization and scalability make compliance verification challenging. In this work, we propose an automated framework that allows auditing the cloud infrastructure from the structural point of view while focusing on virtualization-related security properties and consistency between multiple control layers. Furthermore, to show the feasibility of our approach, we integrate our auditing system into OpenStack, one of the most used cloud infrastructure management systems. To show the scalability and validity of our framework, we present our experimental results on assessing several properties related to auditing inter-layer consistency, virtual machines co-residence, and virtual resources isolation.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114980081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics 非随机化内核地址空间布局的内存自省和取证
Yufei Gu, Zhiqiang Lin
Modern OS kernels including Windows, Linux, and Mac OS all have adopted kernel Address Space Layout Randomization (ASLR), which shifts the base address of kernel code and data into different locations in different runs. Consequently, when performing introspection or forensic analysis of kernel memory, we cannot use any pre-determined addresses to interpret the kernel events. Instead, we must derandomize the address space layout and use the new addresses. However, few efforts have been made to derandomize the kernel address space and yet there are many questions left such as which approach is more efficient and robust. Therefore, we present the first systematic study of how to derandomize a kernel when given a memory snapshot of a running kernel instance. Unlike the derandomization approaches used in traditional memory exploits in which only remote access is available, with introspection and forensics applications, we can use all the information available in kernel memory to generate signatures and derandomize the ASLR. In other words, there exists a large volume of solutions for this problem. As such, in this paper we examine a number of typical approaches to generate strong signatures from both kernel code and data based on the insight of how kernel code and data is updated, and compare them from efficiency (in terms of simplicity, speed etc.) and robustness (e.g., whether the approach is hard to be evaded or forged) perspective. In particular, we have designed four approaches including brute-force code scanning, patched code signature generation, unpatched code signature generation, and read-only pointer based approach, according to the intrinsic behavior of kernel code and data with respect to kernel ASLR. We have gained encouraging results for each of these approaches and the corresponding experimental results are reported in this paper.
包括Windows、Linux和Mac OS在内的现代操作系统内核都采用了内核地址空间布局随机化(ASLR),它在不同的运行中将内核代码和数据的基址转移到不同的位置。因此,在对内核内存执行内省或取证分析时,我们不能使用任何预先确定的地址来解释内核事件。相反,我们必须对地址空间布局进行随机化,并使用新的地址。然而,对内核地址空间进行非随机化的努力很少,而且还存在许多问题,例如哪种方法更有效和更健壮。因此,我们首次系统地研究了如何在给定正在运行的内核实例的内存快照时对内核进行非随机化。与传统内存漏洞利用中使用的非随机化方法(只有远程访问可用)不同,通过内省和取证应用程序,我们可以使用内核内存中可用的所有信息来生成签名并对ASLR进行非随机化。换句话说,这个问题存在大量的解决方案。因此,在本文中,我们基于对内核代码和数据如何更新的洞察,研究了一些从内核代码和数据生成强签名的典型方法,并从效率(简单性,速度等方面)和鲁棒性(例如,方法是否难以被规避或伪造)的角度对它们进行了比较。具体而言,我们根据内核代码和数据在内核ASLR方面的内在行为,设计了暴力破解代码扫描、补丁代码签名生成、未补丁代码签名生成和基于只读指针的四种方法。我们对这些方法都取得了令人鼓舞的结果,并在本文中报告了相应的实验结果。
{"title":"Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics","authors":"Yufei Gu, Zhiqiang Lin","doi":"10.1145/2857705.2857707","DOIUrl":"https://doi.org/10.1145/2857705.2857707","url":null,"abstract":"Modern OS kernels including Windows, Linux, and Mac OS all have adopted kernel Address Space Layout Randomization (ASLR), which shifts the base address of kernel code and data into different locations in different runs. Consequently, when performing introspection or forensic analysis of kernel memory, we cannot use any pre-determined addresses to interpret the kernel events. Instead, we must derandomize the address space layout and use the new addresses. However, few efforts have been made to derandomize the kernel address space and yet there are many questions left such as which approach is more efficient and robust. Therefore, we present the first systematic study of how to derandomize a kernel when given a memory snapshot of a running kernel instance. Unlike the derandomization approaches used in traditional memory exploits in which only remote access is available, with introspection and forensics applications, we can use all the information available in kernel memory to generate signatures and derandomize the ASLR. In other words, there exists a large volume of solutions for this problem. As such, in this paper we examine a number of typical approaches to generate strong signatures from both kernel code and data based on the insight of how kernel code and data is updated, and compare them from efficiency (in terms of simplicity, speed etc.) and robustness (e.g., whether the approach is hard to be evaded or forged) perspective. In particular, we have designed four approaches including brute-force code scanning, patched code signature generation, unpatched code signature generation, and read-only pointer based approach, according to the intrinsic behavior of kernel code and data with respect to kernel ASLR. We have gained encouraging results for each of these approaches and the corresponding experimental results are reported in this paper.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122948653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
ARPPM: Administration in the RPPM Model ARPPM: RPPM模型中的管理
J. Crampton, J. Sellwood
The RPPM model of access control uses relationships, paths and principal-matching in order to make access control decisions for general computing systems. Recently Stoller introduced a variant of an early RPPM model supporting administrative actions. Stoller's RPPM^2 model is able to make authorization decisions in respect of actions which affect the system graph and some policy elements. We also see utility in the RPPM model and believe that providing effective administration of the access control model is key to increasing the model's usefulness to real-world implementations. However, whilst we find inspiration in some aspects of Stoller's work, we believe that an alternative approach making use of the latest RPPM model as its basis will offer a wider range of operational and administrative capabilities. We motivate this work with specific requirements for an administrative model and then propose a decentralised discretionary access control approach to administration, whereby users are able to manage model components in the system graph through the addition and deletion of edges. The resulting Administrative RPPM (ARPPM) model supports administration of all of the model's components: the system model, the system graph, the authorization policies and all of their elements.
访问控制的RPPM模型使用关系、路径和主体匹配来制定通用计算系统的访问控制决策。最近,Stoller介绍了支持管理操作的早期RPPM模型的一个变体。Stoller的RPPM^2模型能够针对影响系统图和一些策略元素的操作做出授权决策。我们还看到了RPPM模型的实用性,并认为提供访问控制模型的有效管理是提高模型在实际实现中的实用性的关键。然而,虽然我们在Stoller工作的某些方面找到了灵感,但我们相信,利用最新的RPPM模型作为其基础的替代方法将提供更广泛的操作和管理能力。我们通过对管理模型的特定需求来激励这项工作,然后提出一种分散的自主访问控制方法来管理,用户可以通过添加和删除边缘来管理系统图中的模型组件。生成的Administrative RPPM (ARPPM)模型支持对模型的所有组件的管理:系统模型、系统图、授权策略及其所有元素。
{"title":"ARPPM: Administration in the RPPM Model","authors":"J. Crampton, J. Sellwood","doi":"10.1145/2857705.2857711","DOIUrl":"https://doi.org/10.1145/2857705.2857711","url":null,"abstract":"The RPPM model of access control uses relationships, paths and principal-matching in order to make access control decisions for general computing systems. Recently Stoller introduced a variant of an early RPPM model supporting administrative actions. Stoller's RPPM^2 model is able to make authorization decisions in respect of actions which affect the system graph and some policy elements. We also see utility in the RPPM model and believe that providing effective administration of the access control model is key to increasing the model's usefulness to real-world implementations. However, whilst we find inspiration in some aspects of Stoller's work, we believe that an alternative approach making use of the latest RPPM model as its basis will offer a wider range of operational and administrative capabilities. We motivate this work with specific requirements for an administrative model and then propose a decentralised discretionary access control approach to administration, whereby users are able to manage model components in the system graph through the addition and deletion of edges. The resulting Administrative RPPM (ARPPM) model supports administration of all of the model's components: the system model, the system graph, the authorization policies and all of their elements.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124025695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1