首页 > 最新文献

Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy最新文献

英文 中文
Multi-Modality Mobile Datasets for Behavioral Biometrics Research: Data/Toolset paper 行为生物识别研究的多模态移动数据集:数据/工具集论文
Aratrika Ray-Dowling, A. Wahab, Daqing Hou, S. Schuckers
The ubiquity of mobile devices nowadays necessitates securing the apps and user information stored therein. However, existing one-time entry-point authentication mechanisms and enhanced security mechanisms such as Multi-Factor Authentication (MFA) are prone to a wide vector of attacks. Furthermore, MFA also introduces friction to the user experience. Therefore, what is needed is continuous authentication that once passing the entry-point authentication, will protect the mobile devices on a continuous basis by confirming the legitimate owner of the device and locking out detected impostor activities. Hence, more research is needed on the dynamic methods of mobile security such as behavioral biometrics-based continuous authentication, which is cost-effective and passive as the data utilized to authenticate users are logged from the phone's sensors. However, currently, there are not many mobile authentication datasets to perform benchmarking research. In this work, we share two novel mobile datasets (Clarkson University (CU) Mobile datasets I and II) consisting of multi-modality behavioral biometrics data from 49 and 39 users respectively (88 users in total). Each of our datasets consists of modalities such as swipes, keystrokes, acceleration, gyroscope, and pattern-tracing strokes. These modalities are collected when users are filling out a registration form in sitting both as genuine and impostor users. To exhibit the usefulness of the datasets, we have performed initial experiments on selected individual modalities from the datasets as well as the fusion of simultaneously available modalities.
如今,无处不在的移动设备需要保护存储在其中的应用程序和用户信息。然而,现有的一次性入口点身份验证机制和增强的安全机制(如多因素身份验证(MFA))容易受到广泛的攻击。此外,MFA还会给用户体验带来摩擦。因此,需要的是持续认证,一旦通过入口点认证,将通过确认设备的合法所有者并锁定检测到的冒名顶替活动来持续保护移动设备。因此,需要对移动安全的动态方法进行更多的研究,例如基于行为生物识别的连续认证,这种方法成本低且被动,因为用于认证用户的数据是从手机的传感器记录的。然而,目前还没有太多的移动认证数据集可以进行基准测试研究。在这项工作中,我们共享了两个新的移动数据集(克拉克森大学(CU)移动数据集I和II),分别由49名和39名用户(总共88名用户)的多模态行为生物特征数据组成。我们的每一个数据集都由各种模式组成,如滑动、击键、加速、陀螺仪和模式跟踪击击。当用户以真实用户和冒名用户的身份填写登记表时,收集这些模式。为了展示数据集的有用性,我们对数据集中选择的单个模式以及同时可用模式的融合进行了初步实验。
{"title":"Multi-Modality Mobile Datasets for Behavioral Biometrics Research: Data/Toolset paper","authors":"Aratrika Ray-Dowling, A. Wahab, Daqing Hou, S. Schuckers","doi":"10.1145/3577923.3583637","DOIUrl":"https://doi.org/10.1145/3577923.3583637","url":null,"abstract":"The ubiquity of mobile devices nowadays necessitates securing the apps and user information stored therein. However, existing one-time entry-point authentication mechanisms and enhanced security mechanisms such as Multi-Factor Authentication (MFA) are prone to a wide vector of attacks. Furthermore, MFA also introduces friction to the user experience. Therefore, what is needed is continuous authentication that once passing the entry-point authentication, will protect the mobile devices on a continuous basis by confirming the legitimate owner of the device and locking out detected impostor activities. Hence, more research is needed on the dynamic methods of mobile security such as behavioral biometrics-based continuous authentication, which is cost-effective and passive as the data utilized to authenticate users are logged from the phone's sensors. However, currently, there are not many mobile authentication datasets to perform benchmarking research. In this work, we share two novel mobile datasets (Clarkson University (CU) Mobile datasets I and II) consisting of multi-modality behavioral biometrics data from 49 and 39 users respectively (88 users in total). Each of our datasets consists of modalities such as swipes, keystrokes, acceleration, gyroscope, and pattern-tracing strokes. These modalities are collected when users are filling out a registration form in sitting both as genuine and impostor users. To exhibit the usefulness of the datasets, we have performed initial experiments on selected individual modalities from the datasets as well as the fusion of simultaneously available modalities.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127328636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Windows PE Structure for Adversarial Malware Evasion Attacks 利用Windows PE结构进行对抗性恶意软件规避攻击
K. Aryal, Maanak Gupta, Mahmoud Abdelsalam
The last decade has seen phenomenal growth in the application of machine learning. At this point, it won't be wrong to claim that most technological change is directly or indirectly connected to machine learning. Along with machine learning, cyber-attacks have also bloomed in this period. Machine learning has been a great aid to cybersecurity, but the security of machine learning has not been a topic of attention until recently. Among numerous threats posed to the machine learning community, the Adversarial Evasion attack is the latest menace. The adversarial evasion attack has exposed the vulnerability of the modern deep neural network to a few intentionally perturbed data samples. The adversarial evasion attacks originated from the image domain but have now spread across major application domains of machine learning. This work will discuss the state-of-art adversarial evasion attacks against the Windows PE Malware detectors. The structure of a file plays a significant role in how an adversarial evasion attack can be carried out to a file. We will discuss the robustness and weakness of the Windows PE file structure toward the adversarial evasion approach. We will present the existing approaches to exploiting Windows PE file structure and their limitations. We will also propose a noble way to manipulate Windows PE structure to carry out an adversarial evasion attack.
在过去的十年里,机器学习的应用出现了惊人的增长。在这一点上,声称大多数技术变革都直接或间接地与机器学习有关是没有错的。随着机器学习,网络攻击也在这一时期蓬勃发展。机器学习对网络安全有很大的帮助,但机器学习的安全性直到最近才成为人们关注的话题。在机器学习社区面临的众多威胁中,对抗性规避攻击是最新的威胁。对抗性规避攻击暴露了现代深度神经网络对少量故意扰动数据样本的脆弱性。对抗性逃避攻击起源于图像领域,但现在已经蔓延到机器学习的主要应用领域。本工作将讨论针对Windows PE恶意软件检测器的最先进的对抗性规避攻击。文件的结构在如何对文件进行对抗性规避攻击中起着重要作用。我们将讨论Windows PE文件结构对对抗性规避方法的健壮性和弱点。我们将介绍利用Windows PE文件结构的现有方法及其局限性。我们还将提出一种高贵的方法来操纵Windows PE结构来执行对抗性规避攻击。
{"title":"Exploiting Windows PE Structure for Adversarial Malware Evasion Attacks","authors":"K. Aryal, Maanak Gupta, Mahmoud Abdelsalam","doi":"10.1145/3577923.3585044","DOIUrl":"https://doi.org/10.1145/3577923.3585044","url":null,"abstract":"The last decade has seen phenomenal growth in the application of machine learning. At this point, it won't be wrong to claim that most technological change is directly or indirectly connected to machine learning. Along with machine learning, cyber-attacks have also bloomed in this period. Machine learning has been a great aid to cybersecurity, but the security of machine learning has not been a topic of attention until recently. Among numerous threats posed to the machine learning community, the Adversarial Evasion attack is the latest menace. The adversarial evasion attack has exposed the vulnerability of the modern deep neural network to a few intentionally perturbed data samples. The adversarial evasion attacks originated from the image domain but have now spread across major application domains of machine learning. This work will discuss the state-of-art adversarial evasion attacks against the Windows PE Malware detectors. The structure of a file plays a significant role in how an adversarial evasion attack can be carried out to a file. We will discuss the robustness and weakness of the Windows PE file structure toward the adversarial evasion approach. We will present the existing approaches to exploiting Windows PE file structure and their limitations. We will also propose a noble way to manipulate Windows PE structure to carry out an adversarial evasion attack.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AutoSpill: Credential Leakage from Mobile Password Managers AutoSpill:从移动密码管理器凭证泄漏
Ankit Gangwal, S. Singh, Abhijeet Srivastava
Password managers (PMs) are becoming increasingly popular on mobile devices, especially on small-screen devices, mainly due to the convenience of automatically filling credentials into login forms. Modern mobile OSes advocate for system-wide autofill frameworks to support autofilling on browsers as well as other apps. Mobile OSes also empower apps to directly render web content within WebView controls without redirecting users to the main browser. par We present a novel technique, called AutoSpill, to leak users' saved credentials during an autofill operation on a webpage loaded into an app's WebView. AutoSpill conveniently dodges the secure autofill process. The majority of popular Android PMs considered in our experiments were found vulnerable to AutoSpill; even when the app hosting the WebView is not actively participating in the leak. Android intermediates in the autofill process because of its app sandboxing. Hence, the responsibility for any credential leakage is often stranded between PMs and the Android system. We investigate the root causes of AutoSpill and propose countermeasures to fundamentally fix AutoSpill for both the parties. We responsibly disclosed our findings to the affected PMs and Android security team.
密码管理器(pm)在移动设备上变得越来越流行,尤其是在小屏幕设备上,主要是因为它可以方便地自动将凭据填写到登录表单中。现代移动操作系统提倡系统范围的自动填充框架,以支持浏览器和其他应用程序的自动填充。移动操作系统还允许应用程序直接在WebView控件中呈现web内容,而无需将用户重定向到主浏览器。我们提出了一种名为AutoSpill的新技术,它可以在加载到应用程序WebView的网页上进行自动填充操作时泄露用户保存的凭据。AutoSpill可以方便地避开安全的自动填充过程。在我们的实验中,大多数受欢迎的Android pm都容易受到AutoSpill的攻击;即使承载WebView的应用程序没有积极参与泄漏。Android在自动填充过程中处于中间位置,因为它的应用程序沙盒。因此,任何凭证泄漏的责任通常是在pm和Android系统之间搁浅的。我们调查了AutoSpill的根本原因,并为双方提出了从根本上修复AutoSpill的对策。我们负责任地向受影响的pm和Android安全团队披露了我们的发现。
{"title":"AutoSpill: Credential Leakage from Mobile Password Managers","authors":"Ankit Gangwal, S. Singh, Abhijeet Srivastava","doi":"10.1145/3577923.3583658","DOIUrl":"https://doi.org/10.1145/3577923.3583658","url":null,"abstract":"Password managers (PMs) are becoming increasingly popular on mobile devices, especially on small-screen devices, mainly due to the convenience of automatically filling credentials into login forms. Modern mobile OSes advocate for system-wide autofill frameworks to support autofilling on browsers as well as other apps. Mobile OSes also empower apps to directly render web content within WebView controls without redirecting users to the main browser. par We present a novel technique, called AutoSpill, to leak users' saved credentials during an autofill operation on a webpage loaded into an app's WebView. AutoSpill conveniently dodges the secure autofill process. The majority of popular Android PMs considered in our experiments were found vulnerable to AutoSpill; even when the app hosting the WebView is not actively participating in the leak. Android intermediates in the autofill process because of its app sandboxing. Hence, the responsibility for any credential leakage is often stranded between PMs and the Android system. We investigate the root causes of AutoSpill and propose countermeasures to fundamentally fix AutoSpill for both the parties. We responsibly disclosed our findings to the affected PMs and Android security team.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127558337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role Models: Role-based Debloating for Web Applications 角色模型:Web应用程序的基于角色的讨论
Babak Amin Azad, Nick Nikiforakis
The process of debloating, i.e., removing unnecessary code and features in software, has become an attractive proposition to managing the ever-expanding attack surface of ever-growing modern applications. Researchers have shown that debloating produces significant security improvements in a variety of application domains including operating systems, libraries, compiled software, and, more recently, web applications. Even though the client/server nature of web applications allows the same backend to serve thousands of users with diverse needs, web applications have been approached monolithically by existing debloating approaches. That is, a feature can be debloated only if none of the users of a web application requires it. Similarly, everyone gets access to the same "global" features, whether they need them or not. Recognizing that different users need access to different features, in this paper we propose role-based debloating for web applications. In this approach, we focus on clustering users with similar usage behavior together and providing them with a custom debloated application that is tailored to their needs. Through a user study with 60 experienced web developers and administrators, we first establish that different users indeed use web applications differently. This data is then used by DBLTR, an automated pipeline for providing tailored debloating based on a user's true requirements. Next to debloating web applications, DBLTR includes a transparent content-delivery mechanism that routes authenticated users to their debloated copies. We demonstrate that for different web applications, DBLTR can be 30-80% more effective than the state-of-the-art in debloating in removing critical vulnerabilities.
对于管理不断增长的现代应用程序的不断扩大的攻击面来说,删除软件中不必要的代码和特性的过程已经成为一个有吸引力的提议。研究人员已经证明,在各种应用程序领域(包括操作系统、库、编译软件以及最近的web应用程序)中,消歧产生了显著的安全性改进。尽管web应用程序的客户机/服务器特性允许同一个后端为具有不同需求的数千个用户提供服务,但通过现有的扩展方法,web应用程序已经实现了单体化。也就是说,只有当web应用程序的所有用户都不需要某个特性时,才可以删除它。同样,每个人都可以访问相同的“全局”功能,无论他们是否需要它们。认识到不同的用户需要访问不同的功能,在本文中,我们提出了基于角色的web应用程序扩展。在这种方法中,我们专注于将具有相似使用行为的用户聚集在一起,并为他们提供根据他们的需求量身定制的扩展应用程序。通过对60名经验丰富的web开发人员和管理员的用户研究,我们首先确定不同的用户确实以不同的方式使用web应用程序。这些数据随后被DBLTR使用,DBLTR是一种自动化管道,可以根据用户的真实需求提供量身定制的充气。除了解压web应用程序之外,DBLTR还包括一个透明的内容传递机制,将经过身份验证的用户路由到解压后的副本。我们证明,对于不同的web应用程序,DBLTR在消除关键漏洞方面可以比最先进的技术高效30-80%。
{"title":"Role Models: Role-based Debloating for Web Applications","authors":"Babak Amin Azad, Nick Nikiforakis","doi":"10.1145/3577923.3583647","DOIUrl":"https://doi.org/10.1145/3577923.3583647","url":null,"abstract":"The process of debloating, i.e., removing unnecessary code and features in software, has become an attractive proposition to managing the ever-expanding attack surface of ever-growing modern applications. Researchers have shown that debloating produces significant security improvements in a variety of application domains including operating systems, libraries, compiled software, and, more recently, web applications. Even though the client/server nature of web applications allows the same backend to serve thousands of users with diverse needs, web applications have been approached monolithically by existing debloating approaches. That is, a feature can be debloated only if none of the users of a web application requires it. Similarly, everyone gets access to the same \"global\" features, whether they need them or not. Recognizing that different users need access to different features, in this paper we propose role-based debloating for web applications. In this approach, we focus on clustering users with similar usage behavior together and providing them with a custom debloated application that is tailored to their needs. Through a user study with 60 experienced web developers and administrators, we first establish that different users indeed use web applications differently. This data is then used by DBLTR, an automated pipeline for providing tailored debloating based on a user's true requirements. Next to debloating web applications, DBLTR includes a transparent content-delivery mechanism that routes authenticated users to their debloated copies. We demonstrate that for different web applications, DBLTR can be 30-80% more effective than the state-of-the-art in debloating in removing critical vulnerabilities.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117313513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems 利用DLBAC方法实现基于ZT分数的物联网系统授权
Safwa Ameer, R. Krishnan, R. Sandhu, Maanak Gupta
The internet of Things (IoT) refers to a network of physical objects that are equipped with sensors, software, and other technologies in order to communicate with other devices and systems over the internet. IoT has emerged as one of the most important technologies of this century over the past few years. To ensure IoT systems' sustainability and security over the long term, several researchers lately motivated the need to incorporate the recently proposed zero trust (ZT) cybersecurity paradigm when designing and implementing access control models for IoT systems. This poster proposes a hybrid access control approach incorporating traditional and deep learning-based authorization techniques toward score-based ZT authorization for IoT systems.
物联网(IoT)是指一个由物理对象组成的网络,这些物理对象配备了传感器、软件和其他技术,以便通过互联网与其他设备和系统进行通信。在过去的几年里,物联网已经成为本世纪最重要的技术之一。为了确保物联网系统的长期可持续性和安全性,一些研究人员最近提出,在设计和实施物联网系统的访问控制模型时,需要纳入最近提出的零信任(ZT)网络安全范式。该海报提出了一种混合访问控制方法,将传统和基于深度学习的授权技术结合起来,用于物联网系统的基于分数的ZT授权。
{"title":"Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems","authors":"Safwa Ameer, R. Krishnan, R. Sandhu, Maanak Gupta","doi":"10.1145/3577923.3585046","DOIUrl":"https://doi.org/10.1145/3577923.3585046","url":null,"abstract":"The internet of Things (IoT) refers to a network of physical objects that are equipped with sensors, software, and other technologies in order to communicate with other devices and systems over the internet. IoT has emerged as one of the most important technologies of this century over the past few years. To ensure IoT systems' sustainability and security over the long term, several researchers lately motivated the need to incorporate the recently proposed zero trust (ZT) cybersecurity paradigm when designing and implementing access control models for IoT systems. This poster proposes a hybrid access control approach incorporating traditional and deep learning-based authorization techniques toward score-based ZT authorization for IoT systems.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Velocity-Aware Geo-Indistinguishability Velocity-Aware Geo-Indistinguishability
Ricardo Mendes, Mariana Cunha, J. Vilela
Location Privacy-Preserving Mechanisms (LPPMs) have been proposed to mitigate the risks of privacy disclosure yielded from location sharing. However, due to the nature of this type of data, spatio-temporal correlations can be leveraged by an adversary to extenuate the protections. Moreover, the application of LPPMs at collection time has been limited due to the difficulty in configuring the parameters and in understanding their impact on the privacy level by the end-user. In this work we adopt the velocity of the user and the frequency of reports as a metric for the correlation between location reports. Based on such metric we propose a generalization of Geo-Indistinguishability denoted Velocity-Aware Geo-Indistinguishability (VA-GI). We define a VA-GI LPPM that provides an automatic and dynamic trade-off between privacy and utility according to the velocity of the user and the frequency of reports. This adaptability can be tuned for general use, by using city or country-wide data, or for specific user profiles, thus warranting fine-grained tuning for users or environments. Our results using vehicular trajectory data show that VA-GI achieves a dynamic trade-off between privacy and utility that outperforms previous works. Additionally, by using a Gaussian distribution as estimation for the distribution of the velocities, we provide a methodology for configuring our proposed LPPM without the need for mobility data. This approach provides the required privacy-utility adaptability while also simplifying its configuration and general application in different contexts.
位置隐私保护机制(LPPMs)被提出用于降低位置共享带来的隐私泄露风险。然而,由于这类数据的性质,攻击者可以利用时空相关性来减轻保护。此外,由于难以配置参数和理解最终用户对隐私级别的影响,lppm在收集时的应用受到了限制。在这项工作中,我们采用用户的速度和报告的频率作为位置报告之间相关性的度量。在此基础上,提出了一种基于速度感知的地理不可分辨性(VA-GI)的概化方法。我们定义了一个VA-GI LPPM,它根据用户的速度和报告的频率在隐私和实用之间提供自动和动态的权衡。这种适应性可以通过使用城市或国家范围的数据或特定的用户配置文件进行调优,从而保证对用户或环境进行细粒度调优。我们使用车辆轨迹数据的结果表明,VA-GI实现了隐私和效用之间的动态权衡,优于以往的工作。此外,通过使用高斯分布作为速度分布的估计,我们提供了一种在不需要移动性数据的情况下配置我们所建议的LPPM的方法。这种方法提供了所需的隐私实用程序适应性,同时还简化了其配置和在不同上下文中的一般应用程序。
{"title":"Velocity-Aware Geo-Indistinguishability","authors":"Ricardo Mendes, Mariana Cunha, J. Vilela","doi":"10.1145/3577923.3583644","DOIUrl":"https://doi.org/10.1145/3577923.3583644","url":null,"abstract":"Location Privacy-Preserving Mechanisms (LPPMs) have been proposed to mitigate the risks of privacy disclosure yielded from location sharing. However, due to the nature of this type of data, spatio-temporal correlations can be leveraged by an adversary to extenuate the protections. Moreover, the application of LPPMs at collection time has been limited due to the difficulty in configuring the parameters and in understanding their impact on the privacy level by the end-user. In this work we adopt the velocity of the user and the frequency of reports as a metric for the correlation between location reports. Based on such metric we propose a generalization of Geo-Indistinguishability denoted Velocity-Aware Geo-Indistinguishability (VA-GI). We define a VA-GI LPPM that provides an automatic and dynamic trade-off between privacy and utility according to the velocity of the user and the frequency of reports. This adaptability can be tuned for general use, by using city or country-wide data, or for specific user profiles, thus warranting fine-grained tuning for users or environments. Our results using vehicular trajectory data show that VA-GI achieves a dynamic trade-off between privacy and utility that outperforms previous works. Additionally, by using a Gaussian distribution as estimation for the distribution of the velocities, we provide a methodology for configuring our proposed LPPM without the need for mobility data. This approach provides the required privacy-utility adaptability while also simplifying its configuration and general application in different contexts.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation 全分布式鲁棒安全多方计算的匿名系统
Andreas Klinger, Felix Battermann, Ulrike Meyer
In secure multi-party computation (SMPC), it is considered that multiple parties that are known to each other evaluate a function over their private inputs in a secure fashion. The participating parties do not learn anything about each other's private inputs beyond what can be deduced from their own input and output. The assumption that the parties know each other, however, does not seem suitable for all potential applications of SMPC. In some applications participants may not only want to hide their private inputs and outputs, but may also want to hide the fact that they are participating in a given function evaluation in the first place. We therefore propose an anonymous system for SMPC that allows parties to anonymously evaluate a function of their private inputs in a fully distributed and secure fashion. The proposed system allows authorized parties to execute an SMPC protocol robust with penalty against a dishonest majority in the presence of a malicious adversary. During the protocol execution, the system guarantees that all participating parties stay anonymous w. r. t. each other as well as any third parties. In addition, it guarantees that in each function evaluation all participating parties are unique, i. e., no party can participate as more than one entity.
在安全多方计算(SMPC)中,认为彼此已知的多方以安全的方式对其私有输入的函数进行评估。除了可以从自己的投入和产出中推断出来的东西外,参与各方对彼此的私人投入一无所知。然而,假设双方彼此认识,似乎并不适用于SMPC的所有潜在应用。在一些应用程序中,参与者可能不仅希望隐藏他们的私有输入和输出,而且还希望首先隐藏他们正在参与给定函数求值的事实。因此,我们为SMPC提出了一个匿名系统,允许各方以完全分布式和安全的方式匿名评估其私人输入的函数。提出的系统允许授权方执行SMPC协议,在恶意对手存在的情况下,对不诚实的大多数进行惩罚。在协议执行过程中,系统保证所有参与方之间以及任何第三方都保持匿名。此外,它保证了在每个函数评估中,所有参与方都是唯一的,即任何一方都不能作为一个以上的实体参与。
{"title":"Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation","authors":"Andreas Klinger, Felix Battermann, Ulrike Meyer","doi":"10.1145/3577923.3583651","DOIUrl":"https://doi.org/10.1145/3577923.3583651","url":null,"abstract":"In secure multi-party computation (SMPC), it is considered that multiple parties that are known to each other evaluate a function over their private inputs in a secure fashion. The participating parties do not learn anything about each other's private inputs beyond what can be deduced from their own input and output. The assumption that the parties know each other, however, does not seem suitable for all potential applications of SMPC. In some applications participants may not only want to hide their private inputs and outputs, but may also want to hide the fact that they are participating in a given function evaluation in the first place. We therefore propose an anonymous system for SMPC that allows parties to anonymously evaluate a function of their private inputs in a fully distributed and secure fashion. The proposed system allows authorized parties to execute an SMPC protocol robust with penalty against a dishonest majority in the presence of a malicious adversary. During the protocol execution, the system guarantees that all participating parties stay anonymous w. r. t. each other as well as any third parties. In addition, it guarantees that in each function evaluation all participating parties are unique, i. e., no party can participate as more than one entity.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A User Study of Keystroke Dynamics as Second Factor in Web MFA 击键动力学作为Web MFA第二因素的用户研究
A. Wahab, Daqing Hou, S. Schuckers
As account compromises and malicious online attacks are on the rise, multi-factor authentication (MFA) has been adopted to defend against these attacks. OTP and mobile push notification are just two examples of the popularly adopted MFA factors. Although MFA improve security, they also add additional steps or hardware to the authentication process, thus increasing the authentication time and introducing friction. On the other hand, keystroke dynamics-based authentication is believed to be a promising MFA for increasing security while reducing friction. While there have been several studies on the usability of other MFA factors, the usability of keystroke dynamics has not been studied. To this end, we have built a web authentication system with the standard features of signup, login and account recovery, and integrated keystroke dynamics as an additional factor. We then conducted a user study on the system where 20 participants completed tasks related to signup, login and account recovery. We have also evaluated a new approach for completing the user enrollment process, which reduces friction by naturally employing other alternative MFA factors (OTP in our study) when keystroke dynamics is not ready for use. Our study shows that while maintaining strong security (0% FPR), adding keystroke dynamics reduces authentication friction by avoiding 66.3% of OTP at login and 85.8% of OTP at account recovery, which in turn reduces the authentication time by 63.3% and 78.9% for login and account recovery respectively. Through an exit survey, all participants have rated the integration of keystroke dynamics with OTP to be more preferable to the conventional OTP-only authentication.
随着帐户泄露和恶意在线攻击的增加,多因素身份验证(multi-factor authentication, MFA)被用于防御这些攻击。OTP和手机推送通知只是被广泛采用的MFA因素的两个例子。尽管MFA提高了安全性,但它们也在身份验证过程中添加了额外的步骤或硬件,从而增加了身份验证时间并引入了摩擦。另一方面,基于击键动态的身份验证被认为是一种很有前途的MFA,可以在减少摩擦的同时提高安全性。虽然对其他MFA因素的可用性进行了一些研究,但对击键动力学的可用性尚未进行研究。为此,我们建立了一个具有注册、登录和帐户恢复标准功能的web认证系统,并集成了击键动力学作为附加因素。然后,我们对系统进行了用户研究,其中20名参与者完成了与注册,登录和帐户恢复相关的任务。我们还评估了一种完成用户注册过程的新方法,当击键动力学还没有准备好使用时,该方法通过自然地使用其他替代MFA因素(在我们的研究中是OTP)来减少摩擦。我们的研究表明,在保持强大的安全性(0% FPR)的同时,添加击键动力学可以通过避免登录时66.3%的OTP和帐户恢复时85.8%的OTP来减少认证摩擦,从而分别将登录和帐户恢复的认证时间减少63.3%和78.9%。通过退出调查,所有参与者都认为将击键动力学与OTP集成比传统的仅OTP身份验证更可取。
{"title":"A User Study of Keystroke Dynamics as Second Factor in Web MFA","authors":"A. Wahab, Daqing Hou, S. Schuckers","doi":"10.1145/3577923.3583642","DOIUrl":"https://doi.org/10.1145/3577923.3583642","url":null,"abstract":"As account compromises and malicious online attacks are on the rise, multi-factor authentication (MFA) has been adopted to defend against these attacks. OTP and mobile push notification are just two examples of the popularly adopted MFA factors. Although MFA improve security, they also add additional steps or hardware to the authentication process, thus increasing the authentication time and introducing friction. On the other hand, keystroke dynamics-based authentication is believed to be a promising MFA for increasing security while reducing friction. While there have been several studies on the usability of other MFA factors, the usability of keystroke dynamics has not been studied. To this end, we have built a web authentication system with the standard features of signup, login and account recovery, and integrated keystroke dynamics as an additional factor. We then conducted a user study on the system where 20 participants completed tasks related to signup, login and account recovery. We have also evaluated a new approach for completing the user enrollment process, which reduces friction by naturally employing other alternative MFA factors (OTP in our study) when keystroke dynamics is not ready for use. Our study shows that while maintaining strong security (0% FPR), adding keystroke dynamics reduces authentication friction by avoiding 66.3% of OTP at login and 85.8% of OTP at account recovery, which in turn reduces the authentication time by 63.3% and 78.9% for login and account recovery respectively. Through an exit survey, all participants have rated the integration of keystroke dynamics with OTP to be more preferable to the conventional OTP-only authentication.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131929583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Backdoors in Collaboration Graphs of Software Repositories 软件存储库协作图中的后门检测
Tom Ganz, Inaam Ashraf, Martin Härterich, Konrad Rieck
Software backdoors pose a major threat to the security of computer systems. Minor modifications to a program are often sufficient to undermine security mechanisms and enable unauthorized access to a system. The direct approach of detecting backdoors using static or dynamic program analysis is a daunting task that becomes increasingly futile with the attacker's capabilities. As a remedy, we introduce an orthogonal strategy for the detection of software backdoors. Instead of searching for concealed functionality in program code, we propose to analyze how a software has been developed and locate clues for malicious activities in its version history, such as in a Git repository. To this end, we model the version history as a collaboration graph that reflects how, when and where developers have committed changes to the software. We develop a method for anomaly detection using graph neural networks that builds on this representation and is able to detect spatial and temporal anomalies in the development process. % We evaluate our approach using a collection of real-world backdoors added to Github repositories. Compared to previous work, our method identifies a significantly larger number of backdoors with a low false-positive rate. While our approach cannot rule out the presence of software backdoors, it provides an alternative detection strategy that complements existing work focused only on program analysis.
软件后门对计算机系统的安全构成了重大威胁。对程序的微小修改通常足以破坏安全机制并允许对系统进行未经授权的访问。使用静态或动态程序分析检测后门的直接方法是一项艰巨的任务,随着攻击者的能力越来越强,这种方法变得越来越徒劳。作为补救措施,我们引入了一种正交策略来检测软件后门。我们不是在程序代码中搜索隐藏的功能,而是建议分析软件是如何开发的,并在其版本历史中(例如在Git存储库中)找到恶意活动的线索。为此,我们将版本历史建模为一个协作图,它反映了开发人员如何、何时以及在何处向软件提交更改。我们开发了一种使用图神经网络的异常检测方法,该方法建立在这种表示的基础上,能够检测开发过程中的空间和时间异常。我们使用添加到Github存储库的真实后门集合来评估我们的方法。与以前的工作相比,我们的方法识别了大量的后门,假阳性率很低。虽然我们的方法不能排除软件后门的存在,但它提供了一种替代检测策略,补充了只关注于程序分析的现有工作。
{"title":"Detecting Backdoors in Collaboration Graphs of Software Repositories","authors":"Tom Ganz, Inaam Ashraf, Martin Härterich, Konrad Rieck","doi":"10.1145/3577923.3583657","DOIUrl":"https://doi.org/10.1145/3577923.3583657","url":null,"abstract":"Software backdoors pose a major threat to the security of computer systems. Minor modifications to a program are often sufficient to undermine security mechanisms and enable unauthorized access to a system. The direct approach of detecting backdoors using static or dynamic program analysis is a daunting task that becomes increasingly futile with the attacker's capabilities. As a remedy, we introduce an orthogonal strategy for the detection of software backdoors. Instead of searching for concealed functionality in program code, we propose to analyze how a software has been developed and locate clues for malicious activities in its version history, such as in a Git repository. To this end, we model the version history as a collaboration graph that reflects how, when and where developers have committed changes to the software. We develop a method for anomaly detection using graph neural networks that builds on this representation and is able to detect spatial and temporal anomalies in the development process. % We evaluate our approach using a collection of real-world backdoors added to Github repositories. Compared to previous work, our method identifies a significantly larger number of backdoors with a low false-positive rate. While our approach cannot rule out the presence of software backdoors, it provides an alternative detection strategy that complements existing work focused only on program analysis.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129076309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone 基于ARM TrustZone的非信任边缘深度学习推理保密执行
Md Shihabul Islam, Mahmoud Zamani, C. Kim, L. Khan, Kevin W. Hamlen
This paper proposes a new confidential deep learning (DL) inference system with ARM TrustZone to provide confidentiality and integrity of DL models and data in an untrusted edge device with limited memory. Although ARM TrustZone supplies a strong, hardware-supported trusted execution environment for protecting sensitive code and data in an edge device against adversaries, resource limitations in typical edge devices have raised significant challenges for protecting on-device DL requiring large memory consumption without sacrificing the security and accuracy of the model. The proposed solution addresses this challenge without modifying the protected DL model, thereby preserving the original prediction accuracy. Comprehensive experiments using different DL architectures and datasets demonstrate that inference services for large and complex DL models can be deployed in edge devices with TrustZone with limited trusted memory, ensuring data confidentiality and preserving the original model's prediction exactness.
本文提出了一种新的基于ARM TrustZone的机密深度学习推理系统,以在内存有限的不可信边缘设备中提供深度学习模型和数据的机密性和完整性。尽管ARM TrustZone提供了一个强大的、硬件支持的可信执行环境,用于保护边缘设备中的敏感代码和数据免受攻击,但典型边缘设备中的资源限制为保护需要大量内存消耗的设备上DL提出了重大挑战,同时又不牺牲模型的安全性和准确性。提出的解决方案在不修改受保护的深度学习模型的情况下解决了这一挑战,从而保持了原始的预测精度。使用不同深度学习架构和数据集的综合实验表明,大型复杂深度学习模型的推理服务可以部署在具有有限可信内存的TrustZone的边缘设备中,确保数据机密性并保持原始模型的预测准确性。
{"title":"Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone","authors":"Md Shihabul Islam, Mahmoud Zamani, C. Kim, L. Khan, Kevin W. Hamlen","doi":"10.1145/3577923.3583648","DOIUrl":"https://doi.org/10.1145/3577923.3583648","url":null,"abstract":"This paper proposes a new confidential deep learning (DL) inference system with ARM TrustZone to provide confidentiality and integrity of DL models and data in an untrusted edge device with limited memory. Although ARM TrustZone supplies a strong, hardware-supported trusted execution environment for protecting sensitive code and data in an edge device against adversaries, resource limitations in typical edge devices have raised significant challenges for protecting on-device DL requiring large memory consumption without sacrificing the security and accuracy of the model. The proposed solution addresses this challenge without modifying the protected DL model, thereby preserving the original prediction accuracy. Comprehensive experiments using different DL architectures and datasets demonstrate that inference services for large and complex DL models can be deployed in edge devices with TrustZone with limited trusted memory, ensuring data confidentiality and preserving the original model's prediction exactness.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1