首页 > 最新文献

Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy最新文献

英文 中文
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux 信息娱乐系统问题:了解车载信息娱乐系统黑客攻击对汽车级Linux的影响和影响
S. Jeong, Minsoo Ryu, Hyunjae Kang, H. Kim
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything communications. An IVI system has control of a connected vehicle and deals with privacy-sensitive information like current geolocation and destination, phonebook, SMS, and driver's voice. Several offensive studies have been conducted on IVI systems of commercialized vehicles to show the feasibility of car hacking. However, to date, there has been no comprehensive analysis of the impact and implications of IVI system exploitations. To understand security and privacy concerns, we provide our experience hosting an IVI system hacking competition, Cyber Security Challenge 2021 (CSC2021). We use a feature-flavored infotainment operating system, Automotive Grade Linux (AGL). The participants gathered and submitted 33 reproducible and verified proofs-of-concept exploit codes targeting 11 components of the AGL-based IVI testbed. The participants exploited four vulnerabilities to steal various data, manipulate the IVI system, and cause a denial of service. The data leakage includes privacy, personally identifiable information, and cabin voice. The participants proved lateral movement to electronic control units and smartphones. We conclude with lessons learned with three mitigation strategies to enhance the security of the IVI system.
车载信息娱乐(IVI)系统连接到异构网络,如控制器局域网总线、蓝牙、Wi-Fi、蜂窝网络和其他车辆到一切的通信。IVI系统可以控制联网车辆,并处理隐私敏感信息,如当前地理位置和目的地、电话簿、短信和驾驶员的声音。在商用车辆的IVI系统上进行了几项攻击性研究,以证明汽车黑客攻击的可行性。然而,到目前为止,还没有对IVI系统开发的影响和影响进行全面的分析。为了了解安全和隐私问题,我们提供了主办IVI系统黑客竞赛的经验,即网络安全挑战2021 (CSC2021)。我们使用一种特色的信息娱乐操作系统,汽车级Linux (AGL)。参与者收集并提交了33个可重复和验证的概念验证漏洞代码,目标是基于agl的IVI测试平台的11个组件。参与者利用四个漏洞窃取各种数据,操纵IVI系统,并导致拒绝服务。数据泄露包括隐私、个人身份信息和机舱语音。参与者证明了电子控制单元和智能手机的横向移动。最后,我们总结了经验教训,提出了三种缓解策略,以增强IVI系统的安全性。
{"title":"Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux","authors":"S. Jeong, Minsoo Ryu, Hyunjae Kang, H. Kim","doi":"10.1145/3577923.3583650","DOIUrl":"https://doi.org/10.1145/3577923.3583650","url":null,"abstract":"An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything communications. An IVI system has control of a connected vehicle and deals with privacy-sensitive information like current geolocation and destination, phonebook, SMS, and driver's voice. Several offensive studies have been conducted on IVI systems of commercialized vehicles to show the feasibility of car hacking. However, to date, there has been no comprehensive analysis of the impact and implications of IVI system exploitations. To understand security and privacy concerns, we provide our experience hosting an IVI system hacking competition, Cyber Security Challenge 2021 (CSC2021). We use a feature-flavored infotainment operating system, Automotive Grade Linux (AGL). The participants gathered and submitted 33 reproducible and verified proofs-of-concept exploit codes targeting 11 components of the AGL-based IVI testbed. The participants exploited four vulnerabilities to steal various data, manipulate the IVI system, and cause a denial of service. The data leakage includes privacy, personally identifiable information, and cabin voice. The participants proved lateral movement to electronic control units and smartphones. We conclude with lessons learned with three mitigation strategies to enhance the security of the IVI system.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Privacy Analysis of Mobile Browsers 手机浏览器的隐私比较分析
Ahsan Zafar, Anupam Das
Online trackers are invasive as they track our digital footprints, many of which are sensitive in nature, and when aggregated over time, they can help infer intricate details about our lifestyles and habits. Although much research has been conducted to understand the effectiveness of existing countermeasures for the desktop platform, little is known about how mobile browsers have evolved to handle online trackers. With mobile devices now generating more web traffic than their desktop counterparts, we fill this research gap through a large-scale comparative analysis of mobile web browsers. We crawl 10K valid websites from the Tranco list on real mobile devices. Our data collection process covers both popular generic browsers (e.g., Chrome, Firefox, and Safari) as well as privacy-focused browsers (e.g., Brave, Duck Duck Go, and Firefox-Focus). We use dynamic analysis of runtime execution traces and static analysis of source codes to highlight the tracking behavior of invasive fingerprinters. We also find evidence of tailored content being served to different browsers. In particular, we note that Firefox Focus sees altered script code, whereas Brave and Duck Duck Go have highly similar content. To test the privacy protection of browsers, we measure the responses of each browser in blocking trackers and advertisers and note the strengths and weaknesses of privacy browsers. To establish ground truth, we use well-known block lists, including EasyList, EasyPrivacy, Disconnect and WhoTracksMe and find that Brave generally blocks the highest number of content that should be blocked as per these lists. Focus performs better against social trackers, and Duck Duck Go restricts third-party trackers that perform email-based tracking.
在线追踪器是侵入性的,因为它们追踪我们的数字足迹,其中许多本质上是敏感的,随着时间的推移,它们可以帮助推断出我们生活方式和习惯的复杂细节。尽管已经进行了大量的研究来了解桌面平台现有对策的有效性,但对于移动浏览器如何进化以处理在线跟踪器知之甚少。随着移动设备比桌面设备产生更多的网络流量,我们通过对移动网络浏览器的大规模对比分析来填补这一研究空白。我们在真正的移动设备上从Tranco列表中抓取了10K个有效网站。我们的数据收集过程涵盖了流行的通用浏览器(例如Chrome, Firefox和Safari)以及以隐私为重点的浏览器(例如Brave, Duck Duck Go和Firefox- focus)。我们使用运行时执行轨迹的动态分析和源代码的静态分析来突出入侵指纹的跟踪行为。我们还发现了针对不同浏览器提供定制内容的证据。我们特别注意到,Firefox Focus看到的是修改过的脚本代码,而Brave和Duck Duck Go的内容非常相似。为了测试浏览器的隐私保护,我们测量了每个浏览器在阻止跟踪器和广告商方面的反应,并指出了隐私浏览器的优缺点。为了确定事实,我们使用了众所周知的阻止列表,包括EasyList, EasyPrivacy, Disconnect和WhoTracksMe,并发现Brave通常会阻止根据这些列表应该阻止的最多内容。Focus在对抗社交追踪器时表现更好,而Duck Duck Go则限制了执行基于电子邮件的追踪的第三方追踪器。
{"title":"Comparative Privacy Analysis of Mobile Browsers","authors":"Ahsan Zafar, Anupam Das","doi":"10.1145/3577923.3583638","DOIUrl":"https://doi.org/10.1145/3577923.3583638","url":null,"abstract":"Online trackers are invasive as they track our digital footprints, many of which are sensitive in nature, and when aggregated over time, they can help infer intricate details about our lifestyles and habits. Although much research has been conducted to understand the effectiveness of existing countermeasures for the desktop platform, little is known about how mobile browsers have evolved to handle online trackers. With mobile devices now generating more web traffic than their desktop counterparts, we fill this research gap through a large-scale comparative analysis of mobile web browsers. We crawl 10K valid websites from the Tranco list on real mobile devices. Our data collection process covers both popular generic browsers (e.g., Chrome, Firefox, and Safari) as well as privacy-focused browsers (e.g., Brave, Duck Duck Go, and Firefox-Focus). We use dynamic analysis of runtime execution traces and static analysis of source codes to highlight the tracking behavior of invasive fingerprinters. We also find evidence of tailored content being served to different browsers. In particular, we note that Firefox Focus sees altered script code, whereas Brave and Duck Duck Go have highly similar content. To test the privacy protection of browsers, we measure the responses of each browser in blocking trackers and advertisers and note the strengths and weaknesses of privacy browsers. To establish ground truth, we use well-known block lists, including EasyList, EasyPrivacy, Disconnect and WhoTracksMe and find that Brave generally blocks the highest number of content that should be blocked as per these lists. Focus performs better against social trackers, and Duck Duck Go restricts third-party trackers that perform email-based tracking.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114340177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tackling Credential Abuse Together 共同解决证书滥用问题
M. Reiter
Despite long-ago predictions [1] that other user-authentication technologies would replace passwords, passwords remain pervasive and are likely to continue to be so [2]. This talk will describe our research on methods to tackle three key ingredients of account takeovers for password-protected accounts today: (i) site database breaches, which is the largest source of stolen passwords for internet sites; (ii) the tendency of users to reuse the same or similar passwords across sites; and (iii) credential stuffing, in which attackers submit breached credentials for one site in login attempts for the same accounts at another. A central theme of our research is that these factors are most effectively addressed by coordinating across sites, in contrast to today's practice of each site defending alone. We summarize algorithms to drive this coordination; the efficacy and security of our proposals; and the scalability of our designs through working implementations.
尽管很久以前就有预测[1],其他用户身份验证技术将取代密码,但密码仍然普遍存在,而且很可能继续如此[2]。本讲座将介绍我们的研究方法,以解决三个关键因素的帐户接管密码保护帐户今天:(i)网站数据库泄露,这是被盗的最大来源的互联网网站的密码;(ii)用户在不同网站重复使用相同或相似密码的趋势;(iii)凭据填充,攻击者在试图登录另一个网站的相同帐户时提交一个网站的违反凭据。我们研究的一个中心主题是,与今天每个站点单独防御的做法相比,这些因素通过跨站点的协调可以最有效地解决。我们总结了驱动这种协调的算法;我们建议的有效性和安全性;以及我们设计通过工作实现的可扩展性。
{"title":"Tackling Credential Abuse Together","authors":"M. Reiter","doi":"10.1145/3577923.3587262","DOIUrl":"https://doi.org/10.1145/3577923.3587262","url":null,"abstract":"Despite long-ago predictions [1] that other user-authentication technologies would replace passwords, passwords remain pervasive and are likely to continue to be so [2]. This talk will describe our research on methods to tackle three key ingredients of account takeovers for password-protected accounts today: (i) site database breaches, which is the largest source of stolen passwords for internet sites; (ii) the tendency of users to reuse the same or similar passwords across sites; and (iii) credential stuffing, in which attackers submit breached credentials for one site in login attempts for the same accounts at another. A central theme of our research is that these factors are most effectively addressed by coordinating across sites, in contrast to today's practice of each site defending alone. We summarize algorithms to drive this coordination; the efficacy and security of our proposals; and the scalability of our designs through working implementations.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114145146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Methods for Privacy Protection and Impact on Fairness 隐私保护的局部方法及其对公平的影响
C. Palamidessi
The increasingly pervasive use of big data and machine learning is raising various ethical issues, in particular privacy and fairness. In this talk, I will discuss some frameworks to understand and mitigate the issues, focusing on iterative methods coming from information theory and statistics. In the area of privacy protection, differential privacy (DP) and its variants are the most successful approaches to date. One of the fundamental issues of DP is how to reconcile the loss of information that it implies with the need to preserve the utility of the data. In this regard, a useful tool to recover utility is the iterative Bayesian update (IBU), an instance of the expectation-maximization method from statistics. I will show that the IBU, combined with a version of DP called d-emphprivacy (also known as metric differential privacy ), outperforms the state-of-the-art, which is based on algebraic methods combined with the randomized response mechanism, widely adopted by the Big Tech industry (Google, Apple, Amazon, ...). Then, I will discuss the issue of biased predictions in machine learning, and how DP can affect the level of fairness and accuracy of the trained model. Finally, I will show that the IBU can be applied also in this domain to ensure fairer treatment of disadvantaged groups and reconcile fairness and accuracy.
大数据和机器学习的日益普及引发了各种道德问题,尤其是隐私和公平问题。在这次演讲中,我将讨论一些框架来理解和缓解问题,重点是来自信息论和统计学的迭代方法。在隐私保护领域,差分隐私(DP)及其变体是迄今为止最成功的方法。数据处理的一个基本问题是如何协调它所暗示的信息丢失与保持数据效用的需要。在这方面,恢复效用的一个有用工具是迭代贝叶斯更新(IBU),这是统计学中期望最大化方法的一个实例。我将展示IBU与称为d-强调隐私(也称为度量差分隐私)的DP版本相结合,优于最先进的技术,该技术基于代数方法与随机响应机制相结合,被大型科技行业(谷歌,苹果,亚马逊等)广泛采用。然后,我将讨论机器学习中有偏见的预测问题,以及DP如何影响训练模型的公平性和准确性。最后,我将证明IBU也可以应用于这一领域,以确保更公平地对待弱势群体,并协调公平性和准确性。
{"title":"Local Methods for Privacy Protection and Impact on Fairness","authors":"C. Palamidessi","doi":"10.1145/3577923.3587263","DOIUrl":"https://doi.org/10.1145/3577923.3587263","url":null,"abstract":"The increasingly pervasive use of big data and machine learning is raising various ethical issues, in particular privacy and fairness. In this talk, I will discuss some frameworks to understand and mitigate the issues, focusing on iterative methods coming from information theory and statistics. In the area of privacy protection, differential privacy (DP) and its variants are the most successful approaches to date. One of the fundamental issues of DP is how to reconcile the loss of information that it implies with the need to preserve the utility of the data. In this regard, a useful tool to recover utility is the iterative Bayesian update (IBU), an instance of the expectation-maximization method from statistics. I will show that the IBU, combined with a version of DP called d-emphprivacy (also known as metric differential privacy ), outperforms the state-of-the-art, which is based on algebraic methods combined with the randomized response mechanism, widely adopted by the Big Tech industry (Google, Apple, Amazon, ...). Then, I will discuss the issue of biased predictions in machine learning, and how DP can affect the level of fairness and accuracy of the trained model. Finally, I will show that the IBU can be applied also in this domain to ensure fairer treatment of disadvantaged groups and reconcile fairness and accuracy.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116829851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Fully Online Matching with Deadlines 隐私保护与截止日期完全在线匹配
Andreas Klinger, Ulrike Meyer
In classical secure multi-party computation (SMPC) it is assumed that a fixed and a priori known set of parties wants to securely evaluate a function of their private inputs. This assumption implies that online problems, in which the set of parties that arrive and leave over time are not a priori known, are not covered by the classical setting. Therefore, the notion of online SMPC has been introduced, and a general feasibility result has been proven that shows that any online algorithm can be implemented as a distributed protocol that is secure in this setting [22, 23]. However, so far, no online SMPC protocol that implements a concrete online algorithm has been proposed and evaluated such that the practicality of the constructive proof is an open question. We close this gap and propose the first privacy-preserving online SMPC protocol for the prominent problem of fully online matching with deadlines. In this problem an (a priori unknown) set of parties with their inputs arrive over time and can then be matched with other parties until they leave when their individual deadline is reached. We prove that our protocol is statistically secure in the presence of a semi-honest adversary that controls strictly less than half of the parties present at each point in time. We extensively evaluate the performance of our protocol in three different network settings, various input sizes and different matching conditions, as well as various numbers of parties.
在经典的安全多方计算(SMPC)中,假设一组固定且先验已知的各方希望安全地评估其私有输入的函数。这一假设意味着,随着时间的推移,到达和离开的各方的集合不是先验已知的在线问题,不包括在经典设置中。因此,引入了在线SMPC的概念,并证明了一个一般的可行性结果,表明在这种设置下,任何在线算法都可以作为安全的分布式协议实现[22,23]。然而,到目前为止,还没有一个实现具体在线算法的在线SMPC协议被提出和评估,因此建设性证明的实用性是一个悬而未决的问题。我们缩小了这一差距,并提出了第一个保护隐私的在线SMPC协议,以解决与截止日期完全在线匹配的突出问题。在这个问题中,一组(先验未知的)具有输入的各方随着时间的推移到达,然后可以与其他各方进行匹配,直到他们在各自的截止日期到达时离开。我们证明,在一个半诚实的对手存在的情况下,我们的协议在统计上是安全的,该对手在每个时间点上控制的参与方严格少于一半。我们在三种不同的网络设置、不同的输入大小和不同的匹配条件以及不同的参与方数量下广泛评估了我们的协议的性能。
{"title":"Privacy-Preserving Fully Online Matching with Deadlines","authors":"Andreas Klinger, Ulrike Meyer","doi":"10.1145/3577923.3583654","DOIUrl":"https://doi.org/10.1145/3577923.3583654","url":null,"abstract":"In classical secure multi-party computation (SMPC) it is assumed that a fixed and a priori known set of parties wants to securely evaluate a function of their private inputs. This assumption implies that online problems, in which the set of parties that arrive and leave over time are not a priori known, are not covered by the classical setting. Therefore, the notion of online SMPC has been introduced, and a general feasibility result has been proven that shows that any online algorithm can be implemented as a distributed protocol that is secure in this setting [22, 23]. However, so far, no online SMPC protocol that implements a concrete online algorithm has been proposed and evaluated such that the practicality of the constructive proof is an open question. We close this gap and propose the first privacy-preserving online SMPC protocol for the prominent problem of fully online matching with deadlines. In this problem an (a priori unknown) set of parties with their inputs arrive over time and can then be matched with other parties until they leave when their individual deadline is reached. We prove that our protocol is statistically secure in the presence of a semi-honest adversary that controls strictly less than half of the parties present at each point in time. We extensively evaluate the performance of our protocol in three different network settings, various input sizes and different matching conditions, as well as various numbers of parties.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Kubernetes Pods communicating over Weave Net through eBPF/XDP from DDoS attacks 保护Kubernetes pod通过eBPF/XDP在Weave网络上通信免受DDoS攻击
Talaya Farasat, Muhammad Ahmad Rathore, JongWon Kim
Kubernetes, a container orchestration tool, can be vulnerable to many network threats. Distributed Denial-of-Service (DDoS) attack causes Kubernetes nodes and Pods/Containers inaccessible to users. In this work, we highlight that extended Berkeley Packet Filter/eXpress Data Path (eBPF/XDP) can protect Kubernetes Weave Net Pods from DDoS attacks by loading the XDP_DROP/FILTER program over the Weave Net VXLAN interface.
Kubernetes是一种容器编排工具,容易受到许多网络威胁的攻击。分布式拒绝服务(DDoS)攻击导致用户无法访问Kubernetes节点和pod / container。在这项工作中,我们强调扩展伯克利包过滤/快速数据路径(eBPF/XDP)可以通过在Weave Net VXLAN接口上加载XDP_DROP/ Filter程序来保护Kubernetes Weave Net Pods免受DDoS攻击。
{"title":"Securing Kubernetes Pods communicating over Weave Net through eBPF/XDP from DDoS attacks","authors":"Talaya Farasat, Muhammad Ahmad Rathore, JongWon Kim","doi":"10.1145/3577923.3585049","DOIUrl":"https://doi.org/10.1145/3577923.3585049","url":null,"abstract":"Kubernetes, a container orchestration tool, can be vulnerable to many network threats. Distributed Denial-of-Service (DDoS) attack causes Kubernetes nodes and Pods/Containers inaccessible to users. In this work, we highlight that extended Berkeley Packet Filter/eXpress Data Path (eBPF/XDP) can protect Kubernetes Weave Net Pods from DDoS attacks by loading the XDP_DROP/FILTER program over the Weave Net VXLAN interface.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand SCAtt-man:用户理解的嵌入式设备基于侧信道的远程认证
Sebastian Surminski, Christian Niesler, Sebastian Linsner, Lucas Davi, Christian A. Reuter
From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.
从最终用户的角度来看,物联网设备的行为就像一个黑匣子:只要它们按预期工作,用户就不会发现任何危害。用户对软件的控制最小。因此,如果监控摄像头或智能音箱被黑客入侵,用户很可能会忽略非法录音和传输。在本文中,我们提出了SCAtt-man,这是第一个专门为用户设计的远程认证方案。SCAtt-man部署基于软件的认证来检查远程设备的完整性,允许用户通过智能手机验证物联网设备的完整性。SCAtt-man的关键新颖之处在于在认证协议中利用了用户可观察的侧信道,如光或声音。我们的概念验证实现针对智能扬声器和基于数据-声音协议的认证协议。我们的评估证明了toolname对各种攻击的有效性及其基于20名参与者的用户研究的可用性。
{"title":"SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand","authors":"Sebastian Surminski, Christian Niesler, Sebastian Linsner, Lucas Davi, Christian A. Reuter","doi":"10.1145/3577923.3583652","DOIUrl":"https://doi.org/10.1145/3577923.3583652","url":null,"abstract":"From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121959926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example 基于风险的OpenStack鉴权:全功能实现与示例指导
Vincent Unsel, Stephan Wiefling, Nils Gruschka, L. Lo Iacono
Online services have difficulties to replace passwords with more secure user authentication mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that users tend to reject such mechanisms in use cases outside of online banking. Relying on password authentication alone, however, is not an option in light of recent attack patterns such as credential stuffing. Risk-Based Authentication (RBA) can serve as an interim solution to increase password-based account security until better methods are in place. Unfortunately, RBA is currently used by only a few major online services, even though it is recommended by various standards and has been shown to be effective in scientific studies. This paper contributes to the hypothesis that the low adoption of RBA in practice can be due to the complexity of implementing it. We provide an RBA implementation for the open source cloud management software OpenStack, which is the first fully functional open source RBA implementation based on the Freeman et al. algorithm, along with initial reference tests that can serve as a guiding example and blueprint for developers.
在线服务很难用更安全的用户身份验证机制(如双因素身份验证(2FA))替换密码。这部分是由于用户倾向于在网上银行以外的用例中拒绝这种机制。但是,考虑到最近的攻击模式(如凭据填充),仅依靠密码身份验证并不是一种选择。在找到更好的方法之前,基于风险的身份验证(RBA)可以作为提高基于密码的帐户安全性的临时解决方案。不幸的是,目前只有少数主要的在线服务使用RBA,尽管它被各种标准推荐,并在科学研究中被证明是有效的。本文提出了一个假设,即RBA在实践中的低采用率可能是由于实现它的复杂性。我们为开源云管理软件OpenStack提供了一个RBA实现,这是第一个基于Freeman等算法的全功能开源RBA实现,同时提供了初始参考测试,可以作为开发人员的指导示例和蓝图。
{"title":"Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example","authors":"Vincent Unsel, Stephan Wiefling, Nils Gruschka, L. Lo Iacono","doi":"10.1145/3577923.3583634","DOIUrl":"https://doi.org/10.1145/3577923.3583634","url":null,"abstract":"Online services have difficulties to replace passwords with more secure user authentication mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that users tend to reject such mechanisms in use cases outside of online banking. Relying on password authentication alone, however, is not an option in light of recent attack patterns such as credential stuffing. Risk-Based Authentication (RBA) can serve as an interim solution to increase password-based account security until better methods are in place. Unfortunately, RBA is currently used by only a few major online services, even though it is recommended by various standards and has been shown to be effective in scientific studies. This paper contributes to the hypothesis that the low adoption of RBA in practice can be due to the complexity of implementing it. We provide an RBA implementation for the open source cloud management software OpenStack, which is the first fully functional open source RBA implementation based on the Freeman et al. algorithm, along with initial reference tests that can serve as a guiding example and blueprint for developers.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"1148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120878622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Users Really Do Respond To Smishing 用户确实对欺骗有反应
M. L. Rahman, Daniel Timko, H. Wali, Ajaya Neupane
Text phish messages, referred to as Smishing (SMS + phishing) is a type of social engineering attack where fake text messages are created, and used to lure users into responding to those messages. These messages aim to obtain user credentials, install malware on the phones, or launch smishing attacks. They ask users to reply to their message, click on a URL that redirects them to a phishing website, or call the provided number. Drawing inspiration by the works of Tu et al. on Robocalls and Tischer et al. on USB drives, this paper investigates why smishing works. Accordingly, we designed smishing experiments and sent phishing SMSes to 265 users to measure the efficacy of smishing attacks. We sent eight fake text messages to participants and recorded their CLICK, REPLY, and CALL responses along with their feedback in a post-test survey. Our results reveal that 16.92% of our participants had potentially fallen for our smishing attack. To test repeat phishing, we subjected a set of randomly selected participants to a second round of smishing attacks with a different message than the one they received in the first round. As a result, we observed that 12.82% potentially fell for the attack again. Using logistic regression, we observed that a combination of user REPLY and CLICK actions increased the odds that a user would respond to our smishing message when compared to CLICK. Additionally, we found a similar statistically significant increase when comparing Facebook and Walmart entity scenario to our IRS baseline. Based on our results, we pinpoint essentially message attributes and demographic features that contribute to a statistically significant change in the response rates to smishing attacks.
文本网络钓鱼消息,称为Smishing (SMS + phishing),是一种社会工程攻击,通过创建虚假文本消息来引诱用户响应这些消息。这些信息的目的是获取用户凭证,在手机上安装恶意软件,或者发起诈骗攻击。他们要求用户回复他们的信息,点击将他们重定向到网络钓鱼网站的URL,或者拨打所提供的号码。从Tu等人在Robocalls和Tischer等人在USB驱动器上的作品中获得灵感,本文研究了为什么欺骗有效。因此,我们设计了诈骗实验,并向265个用户发送了钓鱼短信,以衡量诈骗攻击的有效性。我们向参与者发送了八条假短信,并记录了他们的点击、回复和呼叫反应,以及他们在测试后调查中的反馈。我们的结果显示,16.92%的参与者可能会被我们的欺骗攻击所欺骗。为了测试重复网络钓鱼,我们让一组随机选择的参与者接受第二轮的钓鱼攻击,其中的消息与他们在第一轮收到的消息不同。结果,我们观察到有12.82%的用户可能再次遭到攻击。使用逻辑回归,我们观察到,与CLICK相比,用户REPLY和CLICK操作的组合增加了用户响应我们的欺骗消息的几率。此外,当将Facebook和沃尔玛实体场景与IRS基线进行比较时,我们发现了类似的统计学显著增长。根据我们的结果,我们确定了消息属性和人口统计特征,这些特征导致了对欺骗攻击的响应率在统计上的显著变化。
{"title":"Users Really Do Respond To Smishing","authors":"M. L. Rahman, Daniel Timko, H. Wali, Ajaya Neupane","doi":"10.1145/3577923.3583640","DOIUrl":"https://doi.org/10.1145/3577923.3583640","url":null,"abstract":"Text phish messages, referred to as Smishing (SMS + phishing) is a type of social engineering attack where fake text messages are created, and used to lure users into responding to those messages. These messages aim to obtain user credentials, install malware on the phones, or launch smishing attacks. They ask users to reply to their message, click on a URL that redirects them to a phishing website, or call the provided number. Drawing inspiration by the works of Tu et al. on Robocalls and Tischer et al. on USB drives, this paper investigates why smishing works. Accordingly, we designed smishing experiments and sent phishing SMSes to 265 users to measure the efficacy of smishing attacks. We sent eight fake text messages to participants and recorded their CLICK, REPLY, and CALL responses along with their feedback in a post-test survey. Our results reveal that 16.92% of our participants had potentially fallen for our smishing attack. To test repeat phishing, we subjected a set of randomly selected participants to a second round of smishing attacks with a different message than the one they received in the first round. As a result, we observed that 12.82% potentially fell for the attack again. Using logistic regression, we observed that a combination of user REPLY and CLICK actions increased the odds that a user would respond to our smishing message when compared to CLICK. Additionally, we found a similar statistically significant increase when comparing Facebook and Walmart entity scenario to our IRS baseline. Based on our results, we pinpoint essentially message attributes and demographic features that contribute to a statistically significant change in the response rates to smishing attacks.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2 在线多人游戏中的属性推理攻击——以《DOTA2》为例
Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, M. Conti
Did you know that over 70 million of Dota2 players have their in-game data freely accessible? What if such data is used in malicious ways? This paper is the first to investigate such a problem. Motivated by the widespread popularity of video games, we propose the first threat model for Attribute Inference Attacks (AIA) in the Dota2 context. We explain how (and why) attackers can exploit the abundant public data in the Dota2 ecosystem to infer private information about its players. Due to lack of concrete evidence on the efficacy of our AIA, we empirically prove and assess their impact in reality. By conducting an extensive survey on 500 Dota2 players spanning over 26k matches, we verify whether a correlation exists between a player's Dota2 activity and their real-life. Then, after finding such a link (p < 0.01 and ρ > 0.3), we ethically perform diverse AIA. We leverage the capabilities of machine learning to infer real-life attributes of the respondents of our survey by using their publicly available in-game data. Our results show that, by applyingdomain expertise, some AIA can reach up to 98% precision and over 90% accuracy. This paper hence raises the alarm on a subtle, but concrete threat that can potentially affect the entire competitive gaming landscape. We alerted the developers of Dota2.
你知道超过7000万Dota2玩家的游戏数据是免费的吗?如果这些数据被恶意使用怎么办?本文首次对这一问题进行了研究。由于电子游戏的广泛流行,我们提出了Dota2背景下属性推理攻击(AIA)的第一个威胁模型。我们解释了攻击者如何(以及为什么)利用Dota2生态系统中丰富的公共数据来推断玩家的私人信息。由于缺乏具体的证据证明我们的AIA的有效性,我们实证证明和评估其在现实中的影响。通过对500名Dota2玩家进行的调查,我们验证了玩家的Dota2活动与他们的现实生活之间是否存在相关性。然后,在找到这样的联系(p < 0.01和ρ > 0.3)后,我们在道德上执行多样化的AIA。我们利用机器学习的能力,通过使用公开的游戏内数据来推断调查对象的真实属性。我们的研究结果表明,通过应用领域专业知识,一些AIA可以达到98%的精度和90%以上的准确度。因此,本文提出了一个微妙但具体的威胁,它可能会影响整个竞争游戏领域。我们提醒了Dota2的开发者。
{"title":"Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2","authors":"Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, M. Conti","doi":"10.1145/3577923.3583653","DOIUrl":"https://doi.org/10.1145/3577923.3583653","url":null,"abstract":"Did you know that over 70 million of Dota2 players have their in-game data freely accessible? What if such data is used in malicious ways? This paper is the first to investigate such a problem. Motivated by the widespread popularity of video games, we propose the first threat model for Attribute Inference Attacks (AIA) in the Dota2 context. We explain how (and why) attackers can exploit the abundant public data in the Dota2 ecosystem to infer private information about its players. Due to lack of concrete evidence on the efficacy of our AIA, we empirically prove and assess their impact in reality. By conducting an extensive survey on 500 Dota2 players spanning over 26k matches, we verify whether a correlation exists between a player's Dota2 activity and their real-life. Then, after finding such a link (p < 0.01 and ρ > 0.3), we ethically perform diverse AIA. We leverage the capabilities of machine learning to infer real-life attributes of the respondents of our survey by using their publicly available in-game data. Our results show that, by applyingdomain expertise, some AIA can reach up to 98% precision and over 90% accuracy. This paper hence raises the alarm on a subtle, but concrete threat that can potentially affect the entire competitive gaming landscape. We alerted the developers of Dota2.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1