首页 > 最新文献

Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy最新文献

英文 中文
Grote: Group Testing for Privacy-Preserving Face Identification Grote:保护隐私的人脸识别组测试
Alberto Ibarrondo, H. Chabanne, V. Despiegel, Melek Önen
This paper proposes a novel method to perform privacy-preserving face identification based on the notion of group testing, and applies it to a solution using the Cheon-Kim-Kim-Song (CKKS) homomorphic encryption scheme. Securely computing the closest reference template to a given live template requires K comparisons, as many as there are identities in a biometric database. Our solution, named Grote, replaces element-wise testing by group testing to drastically reduce the number of such costly, non-linear operations in the encrypted domain from K to up to 2sqrtK . More specifically, we approximate the max of the coordinates of a large vector by raising to the α-th power and cumulative sum in a 2D layout, incurring a small impact in the accuracy of the system while greatly speeding up its execution. We implement Grote and evaluate its performance.
提出了一种基于群测试的人脸识别方法,并将其应用于CKKS (Cheon-Kim-Kim-Song)同态加密方案。安全地计算与给定活动模板最接近的参考模板需要K次比较,与生物识别数据库中的身份一样多。我们的解决方案,名为Grote,用组测试取代了元素测试,从而大大减少了加密域中这种昂贵的非线性操作的数量,从K到最多2sqrtK。更具体地说,我们通过提高到二维布局中的α-次幂和累积和来近似大矢量坐标的最大值,这对系统的精度产生了很小的影响,同时大大加快了其执行速度。我们实现Grote并评估其性能。
{"title":"Grote: Group Testing for Privacy-Preserving Face Identification","authors":"Alberto Ibarrondo, H. Chabanne, V. Despiegel, Melek Önen","doi":"10.1145/3577923.3583656","DOIUrl":"https://doi.org/10.1145/3577923.3583656","url":null,"abstract":"This paper proposes a novel method to perform privacy-preserving face identification based on the notion of group testing, and applies it to a solution using the Cheon-Kim-Kim-Song (CKKS) homomorphic encryption scheme. Securely computing the closest reference template to a given live template requires K comparisons, as many as there are identities in a biometric database. Our solution, named Grote, replaces element-wise testing by group testing to drastically reduce the number of such costly, non-linear operations in the encrypted domain from K to up to 2sqrtK . More specifically, we approximate the max of the coordinates of a large vector by raising to the α-th power and cumulative sum in a 2D layout, incurring a small impact in the accuracy of the system while greatly speeding up its execution. We implement Grote and evaluate its performance.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121051724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting Encrypted Virtual Machines from Nested Page Fault Controlled Channel 保护加密虚拟机免受嵌套页错误控制通道
Haoxiang Qin, Zhenyu Song, Weijuan Zhang, Si-Cheng Huang, Wentao Yao, Ge Liu, Xiaoqi Jia, Haichao Du
AMD Secure Encrypted Virtualization (SEV) assumes the hypervisor (HV) is untrusted and introduces hardware memory encryption support for virtual machines (VMs). Previous studies have proposed various attacks against encrypted VMs by exploiting SEV security flaws such as unencrypted VMCB and lack of memory integrity. Most of these flaws have been solved by the subsequent releases of SEV with Encrypted State (SEV-ES) and SEV with Secure Nested Paging (SEV-SNP). However, the latest SEV-SNP cannot stop the malicious HV tampering with critical flags in the nested page table (NPT). So SEV-SNP is still vulnerable to the nested page fault (NPF) controlled channel attack, which is a commonly shared step of most attacks against SEV. Existing works on SEV also cannot defend against NPF controlled channel. In this paper, we first analyze the root cause of NPF controlled channel. Then we propose a software-based approach to protect encrypted VMs from NPF controlled channel. We introduce a virtualization security module (VSM) as a software TCB to deprivilege the HV by modifing the HV to access critical resources indirectly through interfaces managed by VSM. To prevent the untrusted HV from compromising the VSM-based protection, we extend the nested kernel architecture to the virtualization layer to provide isolation for VSM at the same privilege level. A prototype of this approach is implemented based on KVM. The experiments show that the approach can protect encrypted VMs from NPF controlled channel with 1.21% average runtime overhead and 1.47% average I/O overhead.
AMD安全加密虚拟化(SEV)假设虚拟化管理程序(HV)是不受信任的,并为虚拟机(vm)引入硬件内存加密支持。以前的研究提出了利用SEV安全漏洞(如未加密的VMCB和缺乏内存完整性)对加密虚拟机的各种攻击。这些缺陷中的大多数已经被加密状态的SEV (SEV- es)和安全嵌套分页的SEV (SEV- snp)的后续版本解决了。然而,最新的SEV-SNP不能阻止恶意的HV篡改嵌套页表(NPT)中的关键标志。因此,SEV- snp仍然容易受到嵌套页面错误(NPF)控制的通道攻击,这是大多数针对SEV的攻击的共同步骤。现有的SEV也不能防御NPF控制通道。本文首先分析了NPF控制通道产生的根本原因。然后,我们提出了一种基于软件的保护加密虚拟机免受NPF控制通道攻击的方法。我们引入了一个虚拟化安全模块(VSM)作为软件TCB,通过修改HV,使其通过VSM管理的接口间接访问关键资源,从而剥夺HV的特权。为了防止不受信任的HV破坏基于VSM的保护,我们将嵌套内核架构扩展到虚拟化层,在相同的特权级别上为VSM提供隔离。基于KVM实现了该方法的原型。实验表明,该方法可以保护加密虚拟机免受NPF控制通道的攻击,平均运行时开销为1.21%,平均I/O开销为1.47%。
{"title":"Protecting Encrypted Virtual Machines from Nested Page Fault Controlled Channel","authors":"Haoxiang Qin, Zhenyu Song, Weijuan Zhang, Si-Cheng Huang, Wentao Yao, Ge Liu, Xiaoqi Jia, Haichao Du","doi":"10.1145/3577923.3583659","DOIUrl":"https://doi.org/10.1145/3577923.3583659","url":null,"abstract":"AMD Secure Encrypted Virtualization (SEV) assumes the hypervisor (HV) is untrusted and introduces hardware memory encryption support for virtual machines (VMs). Previous studies have proposed various attacks against encrypted VMs by exploiting SEV security flaws such as unencrypted VMCB and lack of memory integrity. Most of these flaws have been solved by the subsequent releases of SEV with Encrypted State (SEV-ES) and SEV with Secure Nested Paging (SEV-SNP). However, the latest SEV-SNP cannot stop the malicious HV tampering with critical flags in the nested page table (NPT). So SEV-SNP is still vulnerable to the nested page fault (NPF) controlled channel attack, which is a commonly shared step of most attacks against SEV. Existing works on SEV also cannot defend against NPF controlled channel. In this paper, we first analyze the root cause of NPF controlled channel. Then we propose a software-based approach to protect encrypted VMs from NPF controlled channel. We introduce a virtualization security module (VSM) as a software TCB to deprivilege the HV by modifing the HV to access critical resources indirectly through interfaces managed by VSM. To prevent the untrusted HV from compromising the VSM-based protection, we extend the nested kernel architecture to the virtualization layer to provide isolation for VSM at the same privilege level. A prototype of this approach is implemented based on KVM. The experiments show that the approach can protect encrypted VMs from NPF controlled channel with 1.21% average runtime overhead and 1.47% average I/O overhead.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds 基于租户的第三方云虚拟网络功能链完整性审计两阶段方法
Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A. S. M. Asadujjaman, M. Pourzandi, M. Debbabi, Mohammad Ekramul Kabir
There is a growing trend of hosting chains of Virtual Network Functions (VNFs) on third-party clouds for more cost-effective deployment. However, the multi-actor nature of such a deployment may allow a mismatch to silently arise between tenant-level specifications of VNF chains and their cloud provider-level deployment. Most existing auditing approaches would face difficulties in identifying such an integrity breach. First, relying on the cloud provider may not be sufficient, since modifications made by a stealthy attacker may seem legitimate to the provider. Second, the tenant cannot directly perform the auditing due to limited access to the provider-level data. In addition, shipping such data to the tenant would incur prohibitive overhead and confidentiality concerns. In this paper, we design a tenant-based, two-stage solution where the first stage leverages tenant-level side-channel information to identify suspected integrity breaches, and then the second stage automatically identifies and anonymizes selected provider-level data for the tenant to verify the suspected breaches from the first stage. The key advantages of our solution are: (i) the first stage gives tenants more control and transparency (with the capability of identifying integrity breaches without the provider's assistance), and (ii) the second stage provides tenants higher accuracy (with the capability of rigorous verification based on provider-level data). Our solution is integrated into OpenStack/Tacker (a popular choice for NFV deployment), and its effectiveness is demonstrated via experiments (e.g., up to 90% accuracy with the first stage alone).
在第三方云上托管虚拟网络功能链(VNFs)的趋势正在增长,以获得更经济高效的部署。然而,这种部署的多参与者特性可能会导致VNF链的租户级规范与其云提供商级部署之间的不匹配。大多数现有的审计方法在识别这种完整性破坏方面将面临困难。首先,依赖云提供商可能是不够的,因为隐蔽的攻击者所做的修改在提供商看来可能是合法的。其次,由于对提供者级别数据的访问有限,租户不能直接执行审计。此外,将这样的数据传送给租户会带来令人望而却步的开销和机密性问题。在本文中,我们设计了一个基于租户的两阶段解决方案,其中第一阶段利用租户级侧通道信息来识别可疑的完整性违规行为,然后第二阶段为租户自动识别和匿名化选定的提供商级数据,以验证第一阶段的可疑违规行为。我们的解决方案的主要优点是:(i)第一阶段为租户提供了更多的控制和透明度(无需提供商帮助即可识别完整性漏洞的能力),(ii)第二阶段为租户提供了更高的准确性(基于提供商级数据的严格验证能力)。我们的解决方案集成到OpenStack/Tacker (NFV部署的热门选择)中,并通过实验证明了其有效性(例如,仅第一阶段就高达90%的准确率)。
{"title":"A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds","authors":"Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A. S. M. Asadujjaman, M. Pourzandi, M. Debbabi, Mohammad Ekramul Kabir","doi":"10.1145/3577923.3583643","DOIUrl":"https://doi.org/10.1145/3577923.3583643","url":null,"abstract":"There is a growing trend of hosting chains of Virtual Network Functions (VNFs) on third-party clouds for more cost-effective deployment. However, the multi-actor nature of such a deployment may allow a mismatch to silently arise between tenant-level specifications of VNF chains and their cloud provider-level deployment. Most existing auditing approaches would face difficulties in identifying such an integrity breach. First, relying on the cloud provider may not be sufficient, since modifications made by a stealthy attacker may seem legitimate to the provider. Second, the tenant cannot directly perform the auditing due to limited access to the provider-level data. In addition, shipping such data to the tenant would incur prohibitive overhead and confidentiality concerns. In this paper, we design a tenant-based, two-stage solution where the first stage leverages tenant-level side-channel information to identify suspected integrity breaches, and then the second stage automatically identifies and anonymizes selected provider-level data for the tenant to verify the suspected breaches from the first stage. The key advantages of our solution are: (i) the first stage gives tenants more control and transparency (with the capability of identifying integrity breaches without the provider's assistance), and (ii) the second stage provides tenants higher accuracy (with the capability of rigorous verification based on provider-level data). Our solution is integrated into OpenStack/Tacker (a popular choice for NFV deployment), and its effectiveness is demonstrated via experiments (e.g., up to 90% accuracy with the first stage alone).","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122914170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs 克服gpu存在下基于hpc的加密劫持检测缺陷
Claudius Pott, Berk Gulmezoglu, T. Eisenbarth
With the rising number of devices connected to the internet, the number of cyber-attacks on these devices increases in parallel. There are several strategies that an attacker can pursue, like stealing intellectual property of a victim or encrypting data to demand ransom for the decryption. In this work, we are focusing on the detection of so called cryptojacking attacks, in which an attacker that gained access to a system, then introduces programs that use the processing power of the victim device to mine cryptocurrencies. The presence of such an attack is not obvious right away and the longer an attacker manages to remain undetected, the longer they can profit having the victim foot the power bill. In this study, we combine previous approaches to demonstrate that cryptojacking attacks can be detected with an accuracy of 96% by leveraging hardware performance counters on the Windows operating system. Further, we present a method to determine which performance events result in the best detection rates, thus allowing the selection of a few performance events that can be monitored simultaneously by modern consumer CPUs. In a next step, we show that the CPU counters-based detection mechanism fails when an attacker switches from using the CPU resources to GPUs for the mining tasks. Based on these findings we then improve the previous detection approaches by extending the CPU performance counters with GPU-specific metrics resulting in 99.86% accuracy for the GPU-based cryptojacking attack class. In addition to a high detection rate the presented approach only causes a negligible performance loss while monitoring the whole system, which allows for continuous monitoring of live systems.
随着连接到互联网的设备数量的增加,针对这些设备的网络攻击数量也随之增加。攻击者可以采用几种策略,例如窃取受害者的知识产权或加密数据以索要解密赎金。在这项工作中,我们专注于检测所谓的加密劫持攻击,在这种攻击中,攻击者获得了对系统的访问权限,然后引入使用受害者设备的处理能力来挖掘加密货币的程序。这种攻击的存在并不是显而易见的,攻击者设法保持不被发现的时间越长,他们可以从受害者支付电费中获利的时间就越长。在这项研究中,我们结合了以前的方法来证明,通过利用Windows操作系统上的硬件性能计数器,可以以96%的准确率检测加密劫持攻击。此外,我们提出了一种方法来确定哪些性能事件导致最佳检测率,从而允许选择一些可以由现代消费者cpu同时监视的性能事件。在下一步中,我们展示了当攻击者从使用CPU资源切换到使用gpu进行挖掘任务时,基于CPU计数器的检测机制会失败。基于这些发现,我们改进了之前的检测方法,通过使用特定于gpu的指标扩展CPU性能计数器,从而使基于gpu的加密劫持攻击类的准确率达到99.86%。除了高检测率外,所提出的方法在监测整个系统时只会造成可忽略不计的性能损失,从而允许对运行系统进行连续监测。
{"title":"Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs","authors":"Claudius Pott, Berk Gulmezoglu, T. Eisenbarth","doi":"10.1145/3577923.3583655","DOIUrl":"https://doi.org/10.1145/3577923.3583655","url":null,"abstract":"With the rising number of devices connected to the internet, the number of cyber-attacks on these devices increases in parallel. There are several strategies that an attacker can pursue, like stealing intellectual property of a victim or encrypting data to demand ransom for the decryption. In this work, we are focusing on the detection of so called cryptojacking attacks, in which an attacker that gained access to a system, then introduces programs that use the processing power of the victim device to mine cryptocurrencies. The presence of such an attack is not obvious right away and the longer an attacker manages to remain undetected, the longer they can profit having the victim foot the power bill. In this study, we combine previous approaches to demonstrate that cryptojacking attacks can be detected with an accuracy of 96% by leveraging hardware performance counters on the Windows operating system. Further, we present a method to determine which performance events result in the best detection rates, thus allowing the selection of a few performance events that can be monitored simultaneously by modern consumer CPUs. In a next step, we show that the CPU counters-based detection mechanism fails when an attacker switches from using the CPU resources to GPUs for the mining tasks. Based on these findings we then improve the previous detection approaches by extending the CPU performance counters with GPU-specific metrics resulting in 99.86% accuracy for the GPU-based cryptojacking attack class. In addition to a high detection rate the presented approach only causes a negligible performance loss while monitoring the whole system, which allows for continuous monitoring of live systems.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130045839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Design of an Ontology for ATT&CK and its Application to Cybersecurity at&ck本体的设计及其在网络安全中的应用
Khandakar Ashrafi Akbar, Sadaf Md Halim, A. Singhal, Basel Abdeen, L. Khan, B. Thuraisingham
The spread of attacks in computer networks and within systems can have severe consequences for both individuals and organizations. One approach to preventing the spread of attacks is to use ontological aid, which is the use of ontologies to provide a structured representation of knowledge about the attack and its components, especially the ones who often disguise themselves to remain undetected for a long time within the system. As soon as one particular stage of such an attack is detected, it is imperative to reduce the amount of spread so that no permanent damage can be done. For this, the security analyst must boil down to technical details from a behavioral perspective so that proper defensive initiatives can be taken. We propose an ontology that will aid security analysts to find out the list of vulnerabilities to be patched so that an ongoing attack campaign can be prevented from spreading even more.
计算机网络和系统内攻击的蔓延可能对个人和组织造成严重后果。防止攻击传播的一种方法是使用本体论援助,即使用本体论提供关于攻击及其组件的知识的结构化表示,特别是那些经常伪装自己以在系统中长时间不被发现的组件。一旦发现这种攻击的一个特定阶段,就必须减少扩散的数量,以免造成永久性损害。为此,安全分析师必须从行为的角度归结为技术细节,以便采取适当的防御措施。我们提出了一个本体,它将帮助安全分析人员找出需要修补的漏洞列表,从而防止正在进行的攻击活动进一步传播。
{"title":"The Design of an Ontology for ATT&CK and its Application to Cybersecurity","authors":"Khandakar Ashrafi Akbar, Sadaf Md Halim, A. Singhal, Basel Abdeen, L. Khan, B. Thuraisingham","doi":"10.1145/3577923.3585051","DOIUrl":"https://doi.org/10.1145/3577923.3585051","url":null,"abstract":"The spread of attacks in computer networks and within systems can have severe consequences for both individuals and organizations. One approach to preventing the spread of attacks is to use ontological aid, which is the use of ontologies to provide a structured representation of knowledge about the attack and its components, especially the ones who often disguise themselves to remain undetected for a long time within the system. As soon as one particular stage of such an attack is detected, it is imperative to reduce the amount of spread so that no permanent damage can be done. For this, the security analyst must boil down to technical details from a behavioral perspective so that proper defensive initiatives can be taken. We propose an ontology that will aid security analysts to find out the list of vulnerabilities to be patched so that an ongoing attack campaign can be prevented from spreading even more.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HAT: Secure and Practical Key Establishment for Implantable Medical Devices 安全实用的植入式医疗器械密钥建立
Sayon Duttagupta, Eduard Marin, Dave Singelée, B. Preneel
During the last few years, Implantable Medical Devices (IMDs) have evolved considerably. IMD manufacturers are now starting to rely on standard wireless technologies for connectivity. Moreover, there is an evolution towards open systems where the IMD can be remotely monitored or reconfigured through personal commercial-off-the-shelf devices such as smartphones or tablets. Nevertheless, a major problem that still remains unsolved today is the secure establishment of cryptographic keys between the IMD and such personal devices. Researchers have already proposed various solutions, most notably by relying on an additional external device. Unfortunately, these proposed approaches are either insecure, difficult to realise in practice, or are unsuitable for the latest generation of IMDs. Motivated by this, we present HAT, a secure and practical solution to provide fine-grained and dynamic access control for the next generation of IMDs, while offering full control and transparency to the patient. The main idea behind HAT is to shift the access control responsibilities from the IMD to an external device under the user's control, such as a smartphone, acting as the IMD's Key Distribution Center. We show that HAT only introduces minimal energy and memory overhead and formally prove its security using Verifpal.
在过去的几年中,植入式医疗器械(imd)有了很大的发展。IMD制造商现在开始依赖标准无线技术进行连接。此外,还有一种向开放系统发展的趋势,即可以通过智能手机或平板电脑等个人商用现成设备远程监控或重新配置IMD。然而,目前仍未解决的一个主要问题是在IMD和此类个人设备之间安全地建立加密密钥。研究人员已经提出了各种解决方案,最引人注目的是依靠额外的外部设备。不幸的是,这些提议的方法要么不安全,在实践中难以实现,要么不适合最新一代的imd。为此,我们提出了HAT,这是一种安全实用的解决方案,可为下一代imd提供细粒度和动态访问控制,同时为患者提供完全控制和透明度。HAT背后的主要思想是将访问控制职责从IMD转移到用户控制下的外部设备,如智能手机,作为IMD的密钥分发中心。我们展示了HAT只引入了最小的能量和内存开销,并使用Verifpal正式证明了它的安全性。
{"title":"HAT: Secure and Practical Key Establishment for Implantable Medical Devices","authors":"Sayon Duttagupta, Eduard Marin, Dave Singelée, B. Preneel","doi":"10.1145/3577923.3583646","DOIUrl":"https://doi.org/10.1145/3577923.3583646","url":null,"abstract":"During the last few years, Implantable Medical Devices (IMDs) have evolved considerably. IMD manufacturers are now starting to rely on standard wireless technologies for connectivity. Moreover, there is an evolution towards open systems where the IMD can be remotely monitored or reconfigured through personal commercial-off-the-shelf devices such as smartphones or tablets. Nevertheless, a major problem that still remains unsolved today is the secure establishment of cryptographic keys between the IMD and such personal devices. Researchers have already proposed various solutions, most notably by relying on an additional external device. Unfortunately, these proposed approaches are either insecure, difficult to realise in practice, or are unsuitable for the latest generation of IMDs. Motivated by this, we present HAT, a secure and practical solution to provide fine-grained and dynamic access control for the next generation of IMDs, while offering full control and transparency to the patient. The main idea behind HAT is to shift the access control responsibilities from the IMD to an external device under the user's control, such as a smartphone, acting as the IMD's Key Distribution Center. We show that HAT only introduces minimal energy and memory overhead and formally prove its security using Verifpal.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition Systems IdDecoder:一种人脸嵌入反转工具及其在人脸识别系统中的隐私和安全含义
Minh-Ha Le, Niklas Carlsson
Most state-of-the-art facial recognition systems (FRS:s) use face embeddings. In this paper, we present the IdDecoder framework, capable of effectively synthesizing realistic-neutralized face images from face embeddings, and two effective attacks on state-of-the-art facial recognition models using embeddings. The first attack is a black-box version of a model inversion attack that allows the attacker to reconstruct a realistic face image that is both visually and numerically (as determined by the FRS:s) recognized as the same identity as the original face used to create a given face embedding. This attack raises significant privacy concerns regarding the membership of the gallery dataset of these systems and highlights the importance of both the people designing and deploying FRS:s paying greater attention to the protection of the face embeddings than currently done. The second attack is a novel attack that performs the model inversion, so to instead create the face of an alternative identity that is visually different from the original identity but has close identity distance (ensuring that it is recognized as being of the same identity). This attack increases the attacked system's false acceptance rate and raises significant security concerns. Finally, we use IdDecoder to visualize, evaluate, and provide insights into differences between three state-of-the-art facial embedding models.
大多数最先进的面部识别系统(FRS:s)使用面部嵌入。在本文中,我们提出了IdDecoder框架,能够有效地从人脸嵌入中合成现实中和的人脸图像,并使用嵌入对最先进的面部识别模型进行了两种有效攻击。第一种攻击是模型反转攻击的黑盒版本,它允许攻击者重建一个真实的人脸图像,该图像在视觉上和数字上(由FRS决定)被识别为与用于创建给定人脸嵌入的原始人脸相同的身份。这次攻击引发了对这些系统的图库数据集成员的重大隐私担忧,并突出了设计和部署FRS的人员比目前更加关注面部嵌入保护的重要性。第二种攻击是一种新颖的攻击,它执行模型反转,从而创建一个在视觉上不同于原始身份但具有近身份距离的替代身份的面孔(确保它被识别为具有相同的身份)。这种攻击增加了被攻击系统的错误接受率,并引起了严重的安全问题。最后,我们使用IdDecoder来可视化,评估和提供对三种最先进的面部嵌入模型之间差异的见解。
{"title":"IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition Systems","authors":"Minh-Ha Le, Niklas Carlsson","doi":"10.1145/3577923.3583645","DOIUrl":"https://doi.org/10.1145/3577923.3583645","url":null,"abstract":"Most state-of-the-art facial recognition systems (FRS:s) use face embeddings. In this paper, we present the IdDecoder framework, capable of effectively synthesizing realistic-neutralized face images from face embeddings, and two effective attacks on state-of-the-art facial recognition models using embeddings. The first attack is a black-box version of a model inversion attack that allows the attacker to reconstruct a realistic face image that is both visually and numerically (as determined by the FRS:s) recognized as the same identity as the original face used to create a given face embedding. This attack raises significant privacy concerns regarding the membership of the gallery dataset of these systems and highlights the importance of both the people designing and deploying FRS:s paying greater attention to the protection of the face embeddings than currently done. The second attack is a novel attack that performs the model inversion, so to instead create the face of an alternative identity that is visually different from the original identity but has close identity distance (ensuring that it is recognized as being of the same identity). This attack increases the attacked system's false acceptance rate and raises significant security concerns. Finally, we use IdDecoder to visualize, evaluate, and provide insights into differences between three state-of-the-art facial embedding models.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RanSAM: Randomized Search for ABAC Policy Mining RanSAM: ABAC策略挖掘的随机搜索
Nakul Aggarwal, S. Sural
This paper presents a novel approach for generating Attribute-based Access Control policies from a given Access Control Matrix (ACM). In contrast to the existing techniques for policy mining, which group the desired accesses in the ACM using certain heuristics, we pose it as a search problem in the policy space. A randomized algorithm is then used to identify the policy that best represents the given ACM. Our initial experiments show promising results.
本文提出了一种从给定的访问控制矩阵(ACM)生成基于属性的访问控制策略的新方法。现有的策略挖掘技术使用某些启发式方法对ACM中的期望访问进行分组,与之相反,我们将其视为策略空间中的搜索问题。然后使用随机算法来确定最能代表给定ACM的策略。我们的初步实验显示出有希望的结果。
{"title":"RanSAM: Randomized Search for ABAC Policy Mining","authors":"Nakul Aggarwal, S. Sural","doi":"10.1145/3577923.3585050","DOIUrl":"https://doi.org/10.1145/3577923.3585050","url":null,"abstract":"This paper presents a novel approach for generating Attribute-based Access Control policies from a given Access Control Matrix (ACM). In contrast to the existing techniques for policy mining, which group the desired accesses in the ACM using certain heuristics, we pose it as a search problem in the policy space. A randomized algorithm is then used to identify the policy that best represents the given ACM. Our initial experiments show promising results.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121427432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tool/Dataset Paper: Realistic ABAC Data Generation using Conditional Tabular GAN 工具/数据集论文:使用条件表格GAN生成现实ABAC数据
Ritwik Rai, S. Sural
Attribute-based Access Control (ABAC) is increasingly being used in a wide variety of applications that include cloud services, IoT, smart homes, healthcare and several others. Conducting systematic and reproducible experiments with benchmark realistic datasets, however, still remains a challenge. To address this shortcoming, in this paper we introduce a method called ConGRASS (Conditional Tabular GAN for Realistic ABAC Simulation Studies) for generating large ABAC datasets. Starting with a given real world dataset of (potentially) limited size, we first train a conditional tabular generative adversarial network for learning its distribution. The trained model is used to generate realistic datasets of arbitrarily large sizes having distribution similar to the original dataset. ConGRASS has been implemented as a free to use web-based tool in which a user can choose the name of a listed real dataset along with the desired dataset size. A CSV file containing ABAC data is generated as output. Extensive evaluation shows the ability of the model to faithfully learn the statistical properties of the selected real data. When such a dataset is used in an actual problem, significant improvement in performance is achieved, proving the utility of ConGRASS.
基于属性的访问控制(ABAC)越来越多地用于各种应用,包括云服务、物联网、智能家居、医疗保健等。然而,用基准现实数据集进行系统和可重复的实验仍然是一个挑战。为了解决这个缺点,在本文中,我们引入了一种称为ConGRASS(现实ABAC仿真研究的条件表格GAN)的方法来生成大型ABAC数据集。从给定的(可能)有限大小的真实世界数据集开始,我们首先训练一个条件表格生成对抗网络来学习其分布。训练后的模型用于生成与原始数据集分布相似的任意大尺寸的真实数据集。ConGRASS已经被实现为一个免费使用的基于web的工具,用户可以选择列出的真实数据集的名称以及所需的数据集大小。生成一个包含ABAC数据的CSV文件作为输出。广泛的评估表明,该模型能够忠实地学习所选真实数据的统计特性。当将这样的数据集用于实际问题时,性能得到了显着提高,证明了ConGRASS的实用性。
{"title":"Tool/Dataset Paper: Realistic ABAC Data Generation using Conditional Tabular GAN","authors":"Ritwik Rai, S. Sural","doi":"10.1145/3577923.3583635","DOIUrl":"https://doi.org/10.1145/3577923.3583635","url":null,"abstract":"Attribute-based Access Control (ABAC) is increasingly being used in a wide variety of applications that include cloud services, IoT, smart homes, healthcare and several others. Conducting systematic and reproducible experiments with benchmark realistic datasets, however, still remains a challenge. To address this shortcoming, in this paper we introduce a method called ConGRASS (Conditional Tabular GAN for Realistic ABAC Simulation Studies) for generating large ABAC datasets. Starting with a given real world dataset of (potentially) limited size, we first train a conditional tabular generative adversarial network for learning its distribution. The trained model is used to generate realistic datasets of arbitrarily large sizes having distribution similar to the original dataset. ConGRASS has been implemented as a free to use web-based tool in which a user can choose the name of a listed real dataset along with the desired dataset size. A CSV file containing ABAC data is generated as output. Extensive evaluation shows the ability of the model to faithfully learn the statistical properties of the selected real data. When such a dataset is used in an actual problem, significant improvement in performance is achieved, proving the utility of ConGRASS.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms 你所有的物联网设备都属于我们:物联网管理平台的安全弱点
B. Tejaswi, Mohammad Mannan, A. Youssef
IoT devices have become an integral part of our day to day activities, and are also being deployed to fulfil a number of industrial, enterprise and agricultural use cases. To efficiently manage and operate these devices, the IoT ecosystem relies on several IoT management platforms. Given the security-sensitive nature of the operations performed by these platforms, analyzing them for security vulnerabilities is critical to protect the ecosystem from potential cyber threats. In this work, by exploring the core functionalities offered by leading platforms, we first design a security evaluation framework. Subsequently, we use our framework to analyze 42 IoT management platforms. Our analysis uncovers a number of high severity unauthorized access vulnerabilities in 9/42 platforms, which could lead to attacks such as remote SIM deactivation, IoT SIM overcharging and device data forgery. Furthermore, we find broken authentication in 11/42 platforms, including complete account takeover on 7/42 platforms, along with remote code execution on one of the platforms. Overall, on 11/42 platforms, we find vulnerabilities that could lead to platform-wide attacks, that affect all users and all devices connected to those platforms.
物联网设备已经成为我们日常活动中不可或缺的一部分,并且也被部署到许多工业,企业和农业用例中。为了有效地管理和操作这些设备,物联网生态系统依赖于多个物联网管理平台。考虑到这些平台执行的操作具有安全敏感性,分析它们的安全漏洞对于保护生态系统免受潜在的网络威胁至关重要。在这项工作中,通过探索领先平台提供的核心功能,我们首先设计了一个安全评估框架。随后,我们使用我们的框架分析了42个物联网管理平台。我们的分析揭示了9/42平台中许多严重的未经授权访问漏洞,这些漏洞可能导致远程SIM卡停用、物联网SIM卡过度充电和设备数据伪造等攻击。此外,我们发现11/42平台中的身份验证被破坏,包括7/42平台上的完整帐户接管,以及其中一个平台上的远程代码执行。总的来说,在11/42平台上,我们发现了可能导致平台范围攻击的漏洞,这些漏洞会影响到所有用户和连接到这些平台的所有设备。
{"title":"All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms","authors":"B. Tejaswi, Mohammad Mannan, A. Youssef","doi":"10.1145/3577923.3583636","DOIUrl":"https://doi.org/10.1145/3577923.3583636","url":null,"abstract":"IoT devices have become an integral part of our day to day activities, and are also being deployed to fulfil a number of industrial, enterprise and agricultural use cases. To efficiently manage and operate these devices, the IoT ecosystem relies on several IoT management platforms. Given the security-sensitive nature of the operations performed by these platforms, analyzing them for security vulnerabilities is critical to protect the ecosystem from potential cyber threats. In this work, by exploring the core functionalities offered by leading platforms, we first design a security evaluation framework. Subsequently, we use our framework to analyze 42 IoT management platforms. Our analysis uncovers a number of high severity unauthorized access vulnerabilities in 9/42 platforms, which could lead to attacks such as remote SIM deactivation, IoT SIM overcharging and device data forgery. Furthermore, we find broken authentication in 11/42 platforms, including complete account takeover on 7/42 platforms, along with remote code execution on one of the platforms. Overall, on 11/42 platforms, we find vulnerabilities that could lead to platform-wide attacks, that affect all users and all devices connected to those platforms.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126842199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1