首页 > 最新文献

Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy最新文献

英文 中文
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits SPICE:一个弥合终端用户不安全网络行为和人格特征之间差距的软件工具
Anjila Tamrakar, Justin D. Russell, Irfan Ahmed, G. Richard, C. Weems
End users are prone to insecure cyber behavior that may lead them to compromise the integrity, availability or confidentiality of their computer systems. For instance, replying to a phishing email may compromise an end user's login credentials. Identifying tendency toward insecure cyber behavior is critically important to improve cyber security posture and thesis of this paper is that the susceptibility of end-users to be a victim of a cyber-attack may be predicted using personality traits such as trait anxiety and callousness. This paper presents an easily configurable, script-based software tool to explore the relationships between the personality traits and insecure cyber behaviors of end users. The software utilizes well-established cognitive methods (such as dot probe) to identify a number of personality traits for a user and further allows researchers to design and conduct experiments through customizable scripting to study the endusers' insecure cyber behaviors. The software also collects fine-grained data on users for analysis.
最终用户倾向于不安全的网络行为,这可能导致他们损害其计算机系统的完整性、可用性或机密性。例如,回复网络钓鱼邮件可能会危及最终用户的登录凭据。识别不安全网络行为的倾向对于提高网络安全态势至关重要,本文的论点是,最终用户成为网络攻击受害者的易感性可以使用人格特征(如特质焦虑和冷漠)来预测。本文提出了一种易于配置的基于脚本的软件工具,用于探索最终用户的人格特征与不安全网络行为之间的关系。该软件利用成熟的认知方法(如点探测)来识别用户的许多个性特征,并进一步允许研究人员通过可定制的脚本设计和进行实验,以研究最终用户的不安全网络行为。该软件还收集用户的细粒度数据进行分析。
{"title":"SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits","authors":"Anjila Tamrakar, Justin D. Russell, Irfan Ahmed, G. Richard, C. Weems","doi":"10.1145/2857705.2857744","DOIUrl":"https://doi.org/10.1145/2857705.2857744","url":null,"abstract":"End users are prone to insecure cyber behavior that may lead them to compromise the integrity, availability or confidentiality of their computer systems. For instance, replying to a phishing email may compromise an end user's login credentials. Identifying tendency toward insecure cyber behavior is critically important to improve cyber security posture and thesis of this paper is that the susceptibility of end-users to be a victim of a cyber-attack may be predicted using personality traits such as trait anxiety and callousness. This paper presents an easily configurable, script-based software tool to explore the relationships between the personality traits and insecure cyber behaviors of end users. The software utilizes well-established cognitive methods (such as dot probe) to identify a number of personality traits for a user and further allows researchers to design and conduct experiments through customizable scripting to study the endusers' insecure cyber behaviors. The software also collects fine-grained data on users for analysis.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
JSLINQ: Building Secure Applications across Tiers JSLINQ:跨层构建安全的应用程序
Musard Balliu, Benjamin Liebe, Daniel Schoepe, A. Sabelfeld
Modern web and mobile applications are complex entities amalgamating different languages, components, and platforms. The rich features span the application tiers and components, some from third parties, and require substantial efforts to ensure that the insecurity of a single component does not render the entire system insecure. As of today, the majority of the known approaches fall short of ensuring security across tiers. This paper proposes a framework for end-to-end security, by tracking information flow through the client, server, and underlying database. The framework utilizes homogeneous meta-programming to provide a uniform language for programming different components. We leverage .NET meta-programming capabilities from the F# language, thus enabling language-integrated queries on databases and interoperable heterogeneous execution on the client and the server. We develop a core of our security enforcement in the form of a security type system for a functional language with mutable store and prove it sound. Based on the core, we develop JSLINQ, an extension of the WebSharper library to track information flow. We demonstrate the capabilities of JSLINQ on the case studies of a password meter, two location-based services, a movie rental database, an online Battleship game, and a friend finder app. Our experiments indicate that JSLINQ is practical for implementing high-assurance web and mobile applications.
现代web和移动应用程序是混合了不同语言、组件和平台的复杂实体。丰富的特性跨越了应用程序层和组件,其中一些来自第三方,并且需要大量的工作来确保单个组件的不安全性不会导致整个系统的不安全性。到目前为止,大多数已知的方法都无法确保跨层的安全性。本文提出了一个端到端安全框架,通过跟踪信息流通过客户端、服务器和底层数据库。该框架利用同构元编程为编程不同的组件提供统一的语言。我们利用了f#语言的。net元编程能力,从而支持数据库上的语言集成查询和客户端和服务器上可互操作的异构执行。我们以具有可变存储的函数式语言的安全类型系统的形式开发了安全执行的核心,并证明它是合理的。在此基础上,我们开发了JSLINQ,这是WebSharper库的一个扩展,用于跟踪信息流。我们在一个密码计、两个基于位置的服务、一个电影租赁数据库、一个在线战舰游戏和一个朋友寻找应用程序的案例研究中展示了JSLINQ的功能。我们的实验表明,JSLINQ对于实现高保证的网络和移动应用程序是实用的。
{"title":"JSLINQ: Building Secure Applications across Tiers","authors":"Musard Balliu, Benjamin Liebe, Daniel Schoepe, A. Sabelfeld","doi":"10.1145/2857705.2857717","DOIUrl":"https://doi.org/10.1145/2857705.2857717","url":null,"abstract":"Modern web and mobile applications are complex entities amalgamating different languages, components, and platforms. The rich features span the application tiers and components, some from third parties, and require substantial efforts to ensure that the insecurity of a single component does not render the entire system insecure. As of today, the majority of the known approaches fall short of ensuring security across tiers. This paper proposes a framework for end-to-end security, by tracking information flow through the client, server, and underlying database. The framework utilizes homogeneous meta-programming to provide a uniform language for programming different components. We leverage .NET meta-programming capabilities from the F# language, thus enabling language-integrated queries on databases and interoperable heterogeneous execution on the client and the server. We develop a core of our security enforcement in the form of a security type system for a functional language with mutable store and prove it sound. Based on the core, we develop JSLINQ, an extension of the WebSharper library to track information flow. We demonstrate the capabilities of JSLINQ on the case studies of a password meter, two location-based services, a movie rental database, an online Battleship game, and a friend finder app. Our experiments indicate that JSLINQ is practical for implementing high-assurance web and mobile applications.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134594771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
DIVERSITY 多样性
J. Knight
Diversity works well in nature where it is the basis of natural selection, a phenomenon that helps biological populations survive as they are challenged by hazards in their environments. Diversity also has a long history in engineering where it is used to counter the effects of design faults. Engineered systems are subject to failure, and significant losses can result from the failure of safetyand security-critical applications. A system that includes identical replicates of one or more components can survive degradation faults, i.e., faults that arise during operation as components age. But identical replicates do not help a system to survive design faults, i.e., faults that are the result of defects in the basic design. Identical replicates will contain the same defect and so will fail together on the same inputs. All software faults are design faults, because software faults are not the result of software “wearing out” over time. Defects that arise in requirements, specification and coding of software are all design faults. A variety of different types of diversity have been developed to deal with design faults. Design diversity couples together systems with identical functionality but with different designs. The different systems are referred to as versions, and the versions are executed in parallel with the results subject to a vote. If erroneous outputs are produced because of design defects in some of the versions, the correct outputs will be produced provided the erroneous outputs are in a minority. There is no guarantee that the different designs will not contain the same faults, and so voting could select an erroneous output. Data diversity couples together identical copies of a given system but executes them in parallel with transformed data. The inverse transformation is applied to the outputs. Artificial diversity applies an algorithmic transformation, such as relocating the address space by a random amount, to a system thereby producing variants that differ in a systematic way. Artificial diversity is an effective method of avoiding the “software monoculture”. All forms of diversity have been applied successfully in the field of cyber security. Artificial diversity is especially important because: (a) when applied carefully it transforms information useful to an attacker, such as the fixed and known locations of variables, into a high-entropy search problem, (b) it incurs little to no execution-time overhead, and (c) it is applied mechanically – no development effort is required. Artificial diversity has been shown to provide strong security protection to systems that contain certain classes of vulnerability whether the problem vulnerabilities are known or unknown. A unique characteristic of artificial diversity is that artificially diverse variants can be constructed and combined into an operational system with a property known as secretless security. For certain classes of vulnerability, such a system is provably protected against
多样性作为自然选择的基础,在自然界中发挥着良好的作用,这种现象有助于生物种群在面临环境危害的挑战时生存下来。多样性在工程领域也有很长的历史,它被用来抵消设计错误的影响。工程系统容易发生故障,安全和安全关键应用程序的故障可能导致重大损失。包含一个或多个组件的相同副本的系统可以经受退化故障,即组件在运行过程中老化而产生的故障。但是,相同的复制并不能帮助系统在设计错误中幸存下来,也就是说,错误是基本设计缺陷的结果。相同的复制将包含相同的缺陷,因此将在相同的输入上一起失败。所有软件故障都是设计故障,因为软件故障不是软件随着时间“磨损”的结果。软件在需求、规范和编码中出现的缺陷都是设计缺陷。已经开发了各种不同类型的多样性来处理设计错误。设计多样性将功能相同但设计不同的系统结合在一起。不同的系统被称为版本,版本与投票的结果并行执行。如果由于某些版本的设计缺陷而产生错误的输出,只要错误的输出是少数,就会产生正确的输出。不能保证不同的设计不会包含相同的错误,因此投票可能会选择错误的输出。数据分集将给定系统的相同副本耦合在一起,但与转换后的数据并行执行。将逆变换应用于输出。人工分集对系统应用一种算法转换,例如随机地重新定位地址空间,从而产生以系统方式不同的变体。人工多样性是避免“软件单一文化”的有效方法。各种形式的多样性在网络安全领域得到了成功的应用。人工多样性特别重要,因为:(a)如果仔细应用,它会将对攻击者有用的信息(例如变量的固定和已知位置)转换为高熵搜索问题,(b)它几乎不会产生执行时间开销,并且(c)它是机械地应用-不需要开发工作。人工多样性已被证明可以为包含某些类型漏洞的系统提供强大的安全保护,无论问题漏洞是已知的还是未知的。人工多样性的一个独特特征是,人工多样化的变体可以被构建并组合成一个具有无秘密安全性的操作系统。对于某些类型的漏洞,这样的系统可以被证明免受攻击,并且不需要保密。
{"title":"DIVERSITY","authors":"J. Knight","doi":"10.1145/2857705.2857728","DOIUrl":"https://doi.org/10.1145/2857705.2857728","url":null,"abstract":"Diversity works well in nature where it is the basis of natural selection, a phenomenon that helps biological populations survive as they are challenged by hazards in their environments. Diversity also has a long history in engineering where it is used to counter the effects of design faults. Engineered systems are subject to failure, and significant losses can result from the failure of safetyand security-critical applications. A system that includes identical replicates of one or more components can survive degradation faults, i.e., faults that arise during operation as components age. But identical replicates do not help a system to survive design faults, i.e., faults that are the result of defects in the basic design. Identical replicates will contain the same defect and so will fail together on the same inputs. All software faults are design faults, because software faults are not the result of software “wearing out” over time. Defects that arise in requirements, specification and coding of software are all design faults. A variety of different types of diversity have been developed to deal with design faults. Design diversity couples together systems with identical functionality but with different designs. The different systems are referred to as versions, and the versions are executed in parallel with the results subject to a vote. If erroneous outputs are produced because of design defects in some of the versions, the correct outputs will be produced provided the erroneous outputs are in a minority. There is no guarantee that the different designs will not contain the same faults, and so voting could select an erroneous output. Data diversity couples together identical copies of a given system but executes them in parallel with transformed data. The inverse transformation is applied to the outputs. Artificial diversity applies an algorithmic transformation, such as relocating the address space by a random amount, to a system thereby producing variants that differ in a systematic way. Artificial diversity is an effective method of avoiding the “software monoculture”. All forms of diversity have been applied successfully in the field of cyber security. Artificial diversity is especially important because: (a) when applied carefully it transforms information useful to an attacker, such as the fixed and known locations of variables, into a high-entropy search problem, (b) it incurs little to no execution-time overhead, and (c) it is applied mechanically – no development effort is required. Artificial diversity has been shown to provide strong security protection to systems that contain certain classes of vulnerability whether the problem vulnerabilities are known or unknown. A unique characteristic of artificial diversity is that artificially diverse variants can be constructed and combined into an operational system with a property known as secretless security. For certain classes of vulnerability, such a system is provably protected against","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114886220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data 神经分析仪:在线数据撤销的灵活过期时间
Apostolis Zarras, K. Kohls, Markus Dürmuth, C. Pöpper
Once data is released to the Internet, there is little hope to successfully delete it, as it may have been duplicated, reposted, and archived in multiple places. This poses a significant threat to users' privacy and their right to permanently erase their very own data. One approach to control the implications on privacy is to assign a lifetime value to the published data and ensure that the data is no longer accessible after this point in time. However, such an approach suffers from the inability to successfully predict the right time when the data should vanish. Consequently, the author of the data can only estimate the correct time, which unfortunately can cause the premature or belated deletion of data. This paper tackles the problem of prefixed lifetimes in data deletion from a different angle and argues that alternative approaches are a desideratum for research. In our approach, we consider different criteria when data should be deleted, such as keeping data available as long as there is sufficient interest for it or untimely delete it in cases of excessive accesses. To assist the self-destruction of data, we propose a protocol and develop a prototype, called Neuralyzer, which leverages the caching mechanisms of the Domain Name System (DNS) to ensure the successful deletion of data. Our experimental results demonstrate that our approach can completely delete published data while at the same time achieving flexible expiration times varying from few days to several months depending on the users' interest.
一旦数据发布到互联网上,成功删除它的希望就很小,因为它可能已经在多个地方被复制、转发和存档。这对用户的隐私和他们永久删除自己数据的权利构成了重大威胁。控制对隐私的影响的一种方法是为发布的数据分配一个生命周期值,并确保在此时间点之后不再访问数据。然而,这种方法的缺点是无法成功地预测数据应该消失的正确时间。因此,数据的作者只能估计正确的时间,不幸的是,这可能导致过早或延迟删除数据。本文从不同的角度讨论了数据删除中的前缀寿命问题,并认为替代方法是研究的理想选择。在我们的方法中,当应该删除数据时,我们考虑了不同的标准,例如只要对数据有足够的兴趣就保持数据可用,或者在过度访问的情况下不及时删除它。为了帮助数据的自毁,我们提出了一个协议,并开发了一个原型,称为Neuralyzer,它利用域名系统(DNS)的缓存机制来确保数据的成功删除。我们的实验结果表明,我们的方法可以完全删除已发布的数据,同时根据用户的兴趣实现灵活的过期时间,从几天到几个月不等。
{"title":"Neuralyzer: Flexible Expiration Times for the Revocation of Online Data","authors":"Apostolis Zarras, K. Kohls, Markus Dürmuth, C. Pöpper","doi":"10.1145/2857705.2857714","DOIUrl":"https://doi.org/10.1145/2857705.2857714","url":null,"abstract":"Once data is released to the Internet, there is little hope to successfully delete it, as it may have been duplicated, reposted, and archived in multiple places. This poses a significant threat to users' privacy and their right to permanently erase their very own data. One approach to control the implications on privacy is to assign a lifetime value to the published data and ensure that the data is no longer accessible after this point in time. However, such an approach suffers from the inability to successfully predict the right time when the data should vanish. Consequently, the author of the data can only estimate the correct time, which unfortunately can cause the premature or belated deletion of data. This paper tackles the problem of prefixed lifetimes in data deletion from a different angle and argues that alternative approaches are a desideratum for research. In our approach, we consider different criteria when data should be deleted, such as keeping data available as long as there is sufficient interest for it or untimely delete it in cases of excessive accesses. To assist the self-destruction of data, we propose a protocol and develop a prototype, called Neuralyzer, which leverages the caching mechanisms of the Domain Name System (DNS) to ensure the successful deletion of data. Our experimental results demonstrate that our approach can completely delete published data while at the same time achieving flexible expiration times varying from few days to several months depending on the users' interest.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
PANDDE: Provenance-based ANomaly Detection of Data Exfiltration PANDDE:基于来源的数据泄露异常检测
Daren Fadolalkarim, Asmaa Sallam, E. Bertino
Preventing data exfiltration by insiders is a challenging process since insiders are users that have access permissions to the data. Existing mechanisms focus on tracking users' activities while they are connected to the database, and are unable to detect anomalous actions that the users perform on the data once they gain access to it. Being able to detect anomalous actions on the data is critical as these actions are often sign of attempts to misuse data. In this paper, we propose an approach to detect anomalous actions executed on data returned to the users from a database. The approach has been implemented as part of the Provenance-based ANomaly Detection of Data Exfiltration (PANDDE) tool. PANDDE leverages data provenance information captured at the operating system level. Such information is then used to create profiles of users' actions on the data once retrieved from the database. The profiles indicate actions that are consistent with the tasks of the users. Actions recorded in the profiles include data printing, emailing, and storage. Profiles are then used at run-time to detect anomalous actions.
防止内部人员泄露数据是一个具有挑战性的过程,因为内部人员是对数据具有访问权限的用户。现有机制侧重于在用户连接到数据库时跟踪用户的活动,并且无法检测用户在获得访问权限后对数据执行的异常操作。能够检测数据上的异常操作是至关重要的,因为这些操作通常是试图滥用数据的迹象。在本文中,我们提出了一种检测从数据库返回给用户的数据执行的异常操作的方法。该方法已作为基于来源的数据泄露异常检测(PANDDE)工具的一部分实现。PANDDE利用在操作系统级别捕获的数据来源信息。然后使用这些信息创建用户对从数据库中检索到的数据的操作的概要文件。概要文件指示与用户任务一致的操作。记录在配置文件中的操作包括数据打印、电子邮件和存储。然后在运行时使用配置文件来检测异常操作。
{"title":"PANDDE: Provenance-based ANomaly Detection of Data Exfiltration","authors":"Daren Fadolalkarim, Asmaa Sallam, E. Bertino","doi":"10.1145/2857705.2857710","DOIUrl":"https://doi.org/10.1145/2857705.2857710","url":null,"abstract":"Preventing data exfiltration by insiders is a challenging process since insiders are users that have access permissions to the data. Existing mechanisms focus on tracking users' activities while they are connected to the database, and are unable to detect anomalous actions that the users perform on the data once they gain access to it. Being able to detect anomalous actions on the data is critical as these actions are often sign of attempts to misuse data. In this paper, we propose an approach to detect anomalous actions executed on data returned to the users from a database. The approach has been implemented as part of the Provenance-based ANomaly Detection of Data Exfiltration (PANDDE) tool. PANDDE leverages data provenance information captured at the operating system level. Such information is then used to create profiles of users' actions on the data once retrieved from the database. The profiles indicate actions that are consistent with the tasks of the users. Actions recorded in the profiles include data printing, emailing, and storage. Profiles are then used at run-time to detect anomalous actions.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps Android杀毒软件检测逻辑推理及有效性评估
Zhenquan Cai, R. Yap
Malware on Android has been reported to be on the rise. There are many anti-virus (AV) apps available on Android. However, most AVs are presented as black-boxes without details given about their workings. In this paper, we propose to determine the key elements used by the AVs, which we call inferring the AV detection logic, through a black-box testing methodology. We perform a large scale experiment on 57 Android AVs using 2000 malware variants to evaluate whether the detection logic can be found and whether the AVs can detect the malware. Our experiments show that a majority of AVs detect malware using simple static features. Such features can be easily obfuscated by renaming or encrypting strings and data, which can make it easy to evade some AVs. We also observe trends showing that AVs use common features to detect malware across all families.
据报道,Android上的恶意软件数量呈上升趋势。安卓系统上有很多杀毒软件。然而,大多数自动驾驶汽车都以黑盒子的形式呈现,没有提供有关其工作原理的细节。在本文中,我们建议通过黑盒测试方法来确定自动驾驶汽车使用的关键元素,我们称之为推断自动驾驶汽车检测逻辑。我们在57辆Android自动驾驶汽车上使用2000种恶意软件变体进行了大规模实验,以评估是否可以找到检测逻辑以及自动驾驶汽车是否可以检测到恶意软件。我们的实验表明,大多数自动驾驶汽车使用简单的静态特征检测恶意软件。通过重命名或加密字符串和数据,可以很容易地混淆这些功能,这可以很容易地逃避一些av。我们还观察到趋势表明,自动驾驶汽车使用通用功能来检测所有家庭的恶意软件。
{"title":"Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps","authors":"Zhenquan Cai, R. Yap","doi":"10.1145/2857705.2857719","DOIUrl":"https://doi.org/10.1145/2857705.2857719","url":null,"abstract":"Malware on Android has been reported to be on the rise. There are many anti-virus (AV) apps available on Android. However, most AVs are presented as black-boxes without details given about their workings. In this paper, we propose to determine the key elements used by the AVs, which we call inferring the AV detection logic, through a black-box testing methodology. We perform a large scale experiment on 57 Android AVs using 2000 malware variants to evaluate whether the detection logic can be found and whether the AVs can detect the malware. Our experiments show that a majority of AVs detect malware using simple static features. Such features can be easily obfuscated by renaming or encrypting strings and data, which can make it easy to evade some AVs. We also observe trends showing that AVs use common features to detect malware across all families.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127750305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On Energy Security of Smartphones 论智能手机的能源安全
Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang
The availability of smartphones is still severely restricted by the limited battery lifetime. To help users understand the energy consumption, major mobile platforms support fine-grained energy profiling for each app. In this paper, we present a new threat, called energy collateral attacks, which can abuse and mislead all existing energy modeling approaches. In particular, energy collateral attacks are able to divulge battery stealthily through interprocess communication, wakelock, and screen. To defend against those at- tacks, we propose E-Android to accurately profile the energy consumption in a comprehensive manner. E-Android monitors energy collateral related events and maintains energy consumption for relevant apps. We utilize E-Android to measure the energy consumption under the attack of six energy malware and two normal scenarios. While Android fails to disclose all these energy-malware-based attacks, E- Android can accurately profile energy consumption and re- veal the existence of energy malware.
智能手机的可用性仍然受到有限的电池寿命的严重限制。为了帮助用户了解能源消耗,主要的移动平台支持每个应用程序的细粒度能源分析。在本文中,我们提出了一种新的威胁,称为能源附带攻击,它可以滥用和误导所有现有的能源建模方法。特别是,能量附带攻击能够通过进程间通信、唤醒锁和屏幕等方式秘密泄露电池。为了防御这些攻击,我们提出了E-Android,以全面准确地描述能源消耗。E-Android监控能源抵押品相关事件,并维护相关应用的能源消耗。我们利用E-Android测量了六种能耗恶意软件攻击和两种正常场景下的能耗。虽然Android无法披露所有这些基于能源恶意软件的攻击,但E- Android可以准确地描述能源消耗并揭示能源恶意软件的存在。
{"title":"On Energy Security of Smartphones","authors":"Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang","doi":"10.1145/2857705.2857738","DOIUrl":"https://doi.org/10.1145/2857705.2857738","url":null,"abstract":"The availability of smartphones is still severely restricted by the limited battery lifetime. To help users understand the energy consumption, major mobile platforms support fine-grained energy profiling for each app. In this paper, we present a new threat, called energy collateral attacks, which can abuse and mislead all existing energy modeling approaches. In particular, energy collateral attacks are able to divulge battery stealthily through interprocess communication, wakelock, and screen. To defend against those at- tacks, we propose E-Android to accurately profile the energy consumption in a comprehensive manner. E-Android monitors energy collateral related events and maintains energy consumption for relevant apps. We utilize E-Android to measure the energy consumption under the attack of six energy malware and two normal scenarios. While Android fails to disclose all these energy-malware-based attacks, E- Android can accurately profile energy consumption and re- veal the existence of energy malware.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AspectDroid: Android App Analysis System AspectDroid: Android应用分析系统
Aisha I. Ali-Gombe, Irfan Ahmed, G. Richard, Vassil Roussev
The growing threat to user privacy related to Android applications (apps) has tremendously increased the need for more reliable and accessible app analysis systems. This paper presents AspectDroid, an application-level system designed to investigate Android applications for possible unwanted activities. AspectDroid is comprised of app instrumentation, automated testing and containment systems. By using static bytecode instrumentation, The growing threat to user privacy related to Android applications (apps) has tremendously increased the need for more reliable and accessible app analysis systems. This paper presents AspectDroid, an application-level system designed to investigate Android applications for possible unwanted activities. AspectDroid is comprised of app instrumentation, automated testing and containment systems. By using static bytecode instrumentation, AspectDroid weaves monitoring code into an existing application and provides data flow and sensitive API usage as well as dynamic instrumentation capabilities. The newly repackaged app is then executed either manually or via an automated testing module. Finally, the flexible containment provided by AspectDroid adds a layer of protection so that malicious activities can be prevented from affecting other devices. The accuracy score of AspectDroid when tested on 105 DroidBench corpus shows it can detect tagged data with 95.29%. We further tested our system on 100 real malware families from the Drebin dataset cite{drebin2014}. The result of our analysis showed AspectDroid incurs approximately 1MB average total memory size overhead and 5.9% average increase in CPU-usage.
Android应用程序对用户隐私的威胁越来越大,这极大地增加了对更可靠和可访问的应用程序分析系统的需求。本文介绍了AspectDroid,一个应用程序级系统,旨在调查Android应用程序中可能不需要的活动。AspectDroid由应用程序仪表、自动化测试和遏制系统组成。Android应用程序(app)对用户隐私的威胁越来越大,这极大地增加了对更可靠和可访问的应用程序分析系统的需求。本文介绍了AspectDroid,一个应用程序级系统,旨在调查Android应用程序中可能不需要的活动。AspectDroid由应用程序仪表、自动化测试和遏制系统组成。通过使用静态字节码检测,AspectDroid将监控代码编织到现有的应用程序中,并提供数据流和敏感的API使用以及动态检测功能。然后手动或通过自动测试模块执行新重新打包的应用程序。最后,AspectDroid提供的灵活遏制增加了一层保护,这样就可以防止恶意活动影响其他设备。在105个DroidBench语料库上对AspectDroid的准确率进行了测试,准确率为95.29%。我们对来自Drebin数据集cite{drebin2014}的100个真实恶意软件家族进一步测试了我们的系统。我们的分析结果显示,AspectDroid导致大约1MB的平均总内存开销和5.9%的cpu使用率平均增长。
{"title":"AspectDroid: Android App Analysis System","authors":"Aisha I. Ali-Gombe, Irfan Ahmed, G. Richard, Vassil Roussev","doi":"10.1145/2857705.2857739","DOIUrl":"https://doi.org/10.1145/2857705.2857739","url":null,"abstract":"The growing threat to user privacy related to Android applications (apps) has tremendously increased the need for more reliable and accessible app analysis systems. This paper presents AspectDroid, an application-level system designed to investigate Android applications for possible unwanted activities. AspectDroid is comprised of app instrumentation, automated testing and containment systems. By using static bytecode instrumentation, The growing threat to user privacy related to Android applications (apps) has tremendously increased the need for more reliable and accessible app analysis systems. This paper presents AspectDroid, an application-level system designed to investigate Android applications for possible unwanted activities. AspectDroid is comprised of app instrumentation, automated testing and containment systems. By using static bytecode instrumentation, AspectDroid weaves monitoring code into an existing application and provides data flow and sensitive API usage as well as dynamic instrumentation capabilities. The newly repackaged app is then executed either manually or via an automated testing module. Finally, the flexible containment provided by AspectDroid adds a layer of protection so that malicious activities can be prevented from affecting other devices. The accuracy score of AspectDroid when tested on 105 DroidBench corpus shows it can detect tagged data with 95.29%. We further tested our system on 100 real malware families from the Drebin dataset cite{drebin2014}. The result of our analysis showed AspectDroid incurs approximately 1MB average total memory size overhead and 5.9% average increase in CPU-usage.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115981829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics 程序对象级数据流分析与数据泄漏和污染取证的应用
Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu
We introduce a novel Data Flow Analysis (DFA) technique, called PoL-DFA (Program-object Level Data Flow Analysis), to analyze the dynamic data flows of server programs. PoL-DFA symbolically analyzes every instruction in the execution trace of a process to keep track of the data flows among program objects (e.g., integers, structures, arrays), and concatenates these pieces of data flows to obtain the overall data flow graph of the execution. We leverage PoL-DFA to identify malicious data flows in data leakage and contamination forensics. In two mocked digital forensic scenarios, for data leakage and contamination respectively, we tested the ability of PoL-DFA to identify data flows among multiple inputs and outputs of server programs. Our results show that PoL-DFA can accurately determine whether the data (or the processed results) from a source file or socket flow to a certain output channel. Based on this information, security administrators can pinpoint the path of data leakage or data contamination. Different from existing dynamic DFA techniques that require excessive amount of instrumentation, PoL-DFA only requires logging the execution traces of the processes being monitored. The measured performance overhead for server programs is 4.24%, on average. The results indicate PoL-DFA is a lightweight DFA solution for data leakage and contamination forensics.
我们介绍了一种新的数据流分析(DFA)技术,称为PoL-DFA(程序-对象级数据流分析),用于分析服务器程序的动态数据流。PoL-DFA象征性地分析进程执行轨迹中的每条指令,以跟踪程序对象(例如,整数、结构、数组)之间的数据流,并将这些数据流片段连接起来,以获得执行的总体数据流图。我们利用PoL-DFA来识别数据泄漏和污染取证中的恶意数据流。在两个模拟的数字取证场景中,分别针对数据泄漏和污染,我们测试了PoL-DFA在服务器程序的多个输入和输出之间识别数据流的能力。我们的结果表明,PoL-DFA可以准确地确定来自源文件或套接字的数据(或处理后的结果)是否流向某个输出通道。根据这些信息,安全管理员可以精确定位数据泄漏或数据污染的路径。与需要大量检测的现有动态DFA技术不同,PoL-DFA只需要记录被监视进程的执行轨迹。服务器程序的测量性能开销平均为4.24%。结果表明,PoL-DFA是用于数据泄漏和污染取证的轻量级DFA解决方案。
{"title":"Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics","authors":"Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu","doi":"10.1145/2857705.2857747","DOIUrl":"https://doi.org/10.1145/2857705.2857747","url":null,"abstract":"We introduce a novel Data Flow Analysis (DFA) technique, called PoL-DFA (Program-object Level Data Flow Analysis), to analyze the dynamic data flows of server programs. PoL-DFA symbolically analyzes every instruction in the execution trace of a process to keep track of the data flows among program objects (e.g., integers, structures, arrays), and concatenates these pieces of data flows to obtain the overall data flow graph of the execution. We leverage PoL-DFA to identify malicious data flows in data leakage and contamination forensics. In two mocked digital forensic scenarios, for data leakage and contamination respectively, we tested the ability of PoL-DFA to identify data flows among multiple inputs and outputs of server programs. Our results show that PoL-DFA can accurately determine whether the data (or the processed results) from a source file or socket flow to a certain output channel. Based on this information, security administrators can pinpoint the path of data leakage or data contamination. Different from existing dynamic DFA techniques that require excessive amount of instrumentation, PoL-DFA only requires logging the execution traces of the processes being monitored. The measured performance overhead for server programs is 4.24%, on average. The results indicate PoL-DFA is a lightweight DFA solution for data leakage and contamination forensics.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132561065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation 评估Android应用分析工具:现状与抗混淆稳健性
Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, M. Winandy, G. Giacinto, Thorsten Holz
The recent past has shown that Android smartphones became the most popular target for malware authors. Malware families offer a variety of features that allow, among the others, to steal arbitrary data and to cause significant monetary losses. This circumstances led to the development of many different analysis methods that are aimed to assess the absence of potential harm or malicious behavior in mobile apps. In return, malware authors devised more sophisticated methods to write mobile malware that attempt to thwart such analyses. In this work, we briefly describe assumptions analysis tools rely on to detect malicious content and behavior. We then present results of a new obfuscation framework that aims to break such assumptions, thus modifying Android apps to avoid them being analyzed by the targeted systems. We use our framework to evaluate the robustness of static and dynamic analysis systems for Android apps against such transformations.
最近的情况表明,Android智能手机成为恶意软件作者最喜欢攻击的目标。恶意软件家族提供了各种各样的功能,其中包括窃取任意数据并造成重大经济损失。这种情况导致了许多不同分析方法的发展,旨在评估移动应用程序中是否存在潜在危害或恶意行为。作为回报,恶意软件的作者设计了更复杂的方法来编写移动恶意软件,试图阻止这种分析。在这项工作中,我们简要描述了分析工具检测恶意内容和行为所依赖的假设。然后,我们展示了一个新的混淆框架的结果,旨在打破这些假设,从而修改Android应用程序,以避免它们被目标系统分析。我们使用我们的框架来评估静态和动态分析系统对Android应用程序的鲁棒性。
{"title":"Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation","authors":"Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, M. Winandy, G. Giacinto, Thorsten Holz","doi":"10.1145/2857705.2857737","DOIUrl":"https://doi.org/10.1145/2857705.2857737","url":null,"abstract":"The recent past has shown that Android smartphones became the most popular target for malware authors. Malware families offer a variety of features that allow, among the others, to steal arbitrary data and to cause significant monetary losses. This circumstances led to the development of many different analysis methods that are aimed to assess the absence of potential harm or malicious behavior in mobile apps. In return, malware authors devised more sophisticated methods to write mobile malware that attempt to thwart such analyses. In this work, we briefly describe assumptions analysis tools rely on to detect malicious content and behavior. We then present results of a new obfuscation framework that aims to break such assumptions, thus modifying Android apps to avoid them being analyzed by the targeted systems. We use our framework to evaluate the robustness of static and dynamic analysis systems for Android apps against such transformations.","PeriodicalId":377412,"journal":{"name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115543846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1