首页 > 最新文献

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Compromising Security of Economic Dispatch in Power System Operations 电力系统运行中的经济调度安全问题
D. Shelar, Pengfei Sun, Saurabh Amin, S. Zonouz
Power grid operations rely on the trustworthy operation of critical control center functionalities, including the so-called Economic Dispatch (ED) problem. The ED problem is a large-scale optimization problem that is periodically solved by the system operator to ensure the balance of supply and load while maintaining reliability constraints. In this paper, we propose a semantics-based attack generation and implementation approach to study the security of the ED problem.1 Firstly, we generate optimal attack vectors to transmission line ratings to induce maximum congestion in the critical lines, resulting in the violation of capacity limits. We formulate a bilevel optimization problem in which the attacker chooses manipulations of line capacity ratings to maximinimize the percentage line capacity violations under linear power flows. We reformulate the bilevel problem as a mixed integer linear program that can be solved efficiently. Secondly, we describe how the optimal attack vectors can be implemented in commercial energy management systems (EMSs). The attack explores the dynamic memory space of the EMS, and replaces the true line capacity ratings stored in data regions with the optimal attack vectors. In contrast to the well-known false data injection attacks to control systems that require compromising distributed sensors, our approach directly implements attacks to the control center server. Our experimental results on benchmark power systems and five widely utilized EMSs show the practical feasibility of our attack generation and implementation approach.
电网的运行依赖于关键控制中心功能的可靠运行,包括所谓的经济调度(ED)问题。电力系统优化问题是一个大规模的优化问题,需要系统运营者周期性地解决,以保证供电和负荷的平衡,同时保持可靠性约束。在本文中,我们提出了一种基于语义的攻击生成和实现方法来研究ED的安全性问题首先,我们对输电线路额定值生成最优攻击向量,以诱导关键线路的最大拥塞,从而导致违反容量限制。我们提出了一个双层优化问题,其中攻击者选择线路容量额定值的操作,以最大限度地提高线性潮流下线路容量违规的百分比。我们将双层问题重新表述为可有效求解的混合整数线性规划。其次,我们描述了如何在商业能源管理系统(ems)中实现最佳攻击向量。该攻击探索了EMS的动态内存空间,并将存储在数据区域中的真实线路容量评级替换为最优攻击向量。与众所周知的需要破坏分布式传感器的控制系统的虚假数据注入攻击相比,我们的方法直接实现对控制中心服务器的攻击。我们在基准电力系统和五种广泛使用的EMSs上的实验结果表明了我们的攻击生成和实现方法的实际可行性。
{"title":"Compromising Security of Economic Dispatch in Power System Operations","authors":"D. Shelar, Pengfei Sun, Saurabh Amin, S. Zonouz","doi":"10.1109/DSN.2017.60","DOIUrl":"https://doi.org/10.1109/DSN.2017.60","url":null,"abstract":"Power grid operations rely on the trustworthy operation of critical control center functionalities, including the so-called Economic Dispatch (ED) problem. The ED problem is a large-scale optimization problem that is periodically solved by the system operator to ensure the balance of supply and load while maintaining reliability constraints. In this paper, we propose a semantics-based attack generation and implementation approach to study the security of the ED problem.1 Firstly, we generate optimal attack vectors to transmission line ratings to induce maximum congestion in the critical lines, resulting in the violation of capacity limits. We formulate a bilevel optimization problem in which the attacker chooses manipulations of line capacity ratings to maximinimize the percentage line capacity violations under linear power flows. We reformulate the bilevel problem as a mixed integer linear program that can be solved efficiently. Secondly, we describe how the optimal attack vectors can be implemented in commercial energy management systems (EMSs). The attack explores the dynamic memory space of the EMS, and replaces the true line capacity ratings stored in data regions with the optimal attack vectors. In contrast to the well-known false data injection attacks to control systems that require compromising distributed sensors, our approach directly implements attacks to the control center server. Our experimental results on benchmark power systems and five widely utilized EMSs show the practical feasibility of our attack generation and implementation approach.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115866780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables 在二进制可执行文件中自动发现抗崩溃原语
B. Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, R. Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, H. Bos, Thorsten Holz
Many modern defenses rely on address space layout randomization (ASLR) to efficiently hide security-sensitive metadata in the address space. Absent implementation flaws, an attacker can only bypass such defenses by repeatedly probing the address space for mapped (security-sensitive) regions, incurring a noisy application crash on any wrong guess. Recent work shows that modern applications contain idioms that allow the construction of crash-resistant code primitives, allowing an attacker to efficiently probe the address space without causing any visible crash. In this paper, we classify different crash-resistant primitives and show that this problem is much more prominent than previously assumed. More specifically, we show that rather than relying on labor-intensive source code inspection to find a few "hidden" application-specific primitives, an attacker can find such primitives semi-automatically, on many classes of real-world programs, at the binary level. To support our claims, we develop methods to locate such primitives in real-world binaries. We successfully identified 29 new potential primitives and constructed proof-of-concept exploits for four of them.
许多现代防御依赖于地址空间布局随机化(ASLR)来有效地隐藏地址空间中的安全敏感元数据。如果没有实现缺陷,攻击者只能通过反复探测映射(安全敏感)区域的地址空间来绕过这些防御,从而导致任何错误猜测导致嘈杂的应用程序崩溃。最近的工作表明,现代应用程序包含允许构造抗崩溃代码原语的习惯用法,允许攻击者有效地探测地址空间,而不会造成任何可见的崩溃。在本文中,我们对不同的抗碰撞原语进行了分类,并表明这个问题比以前假设的要突出得多。更具体地说,我们表明,攻击者可以在二进制级别上,在现实世界的许多程序类中,半自动地找到这些原语,而不是依靠劳动密集型的源代码检查来找到一些“隐藏的”特定于应用程序的原语。为了支持我们的说法,我们开发了在真实二进制文件中定位这些原语的方法。我们成功地确定了29个新的潜在原语,并为其中的4个构建了概念验证漏洞。
{"title":"Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables","authors":"B. Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, R. Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, H. Bos, Thorsten Holz","doi":"10.1109/DSN.2017.58","DOIUrl":"https://doi.org/10.1109/DSN.2017.58","url":null,"abstract":"Many modern defenses rely on address space layout randomization (ASLR) to efficiently hide security-sensitive metadata in the address space. Absent implementation flaws, an attacker can only bypass such defenses by repeatedly probing the address space for mapped (security-sensitive) regions, incurring a noisy application crash on any wrong guess. Recent work shows that modern applications contain idioms that allow the construction of crash-resistant code primitives, allowing an attacker to efficiently probe the address space without causing any visible crash. In this paper, we classify different crash-resistant primitives and show that this problem is much more prominent than previously assumed. More specifically, we show that rather than relying on labor-intensive source code inspection to find a few \"hidden\" application-specific primitives, an attacker can find such primitives semi-automatically, on many classes of real-world programs, at the binary level. To support our claims, we develop methods to locate such primitives in real-world binaries. We successfully identified 29 new potential primitives and constructed proof-of-concept exploits for four of them.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129145248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning 基于传感器和上下文机器学习的隐式智能手机用户认证
Wei-Han Lee, R. Lee
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphone user based on behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We propose novel context-based authentication models to differentiate the legitimate smartphone owner versus other users. We systematically show how to achieve high authentication accuracy with different design alternatives in sensor and feature selection, machine learning techniques, context detection and multiple devices. Our system can achieve excellent authentication performance with 98.1% accuracy with negligible system overhead and less than 2.4% battery consumption.
智能手机用户的身份验证非常重要,因为智能手机中存储了大量敏感数据,智能手机也用于访问各种云数据和服务。然而,智能手机很容易被盗或被攻击者利用。除了初始登录之外,非常需要对继续访问安全关键服务和数据的最终用户进行重新身份验证。因此,本文提出了一种新的认证系统,利用智能手机中无处不在的传感器,基于行为特征对智能手机用户进行隐式连续认证。我们提出了新的基于上下文的身份验证模型,以区分合法的智能手机所有者与其他用户。我们系统地展示了如何在传感器和特征选择、机器学习技术、上下文检测和多设备中使用不同的设计方案来实现高认证准确性。我们的系统可以实现出色的认证性能,准确率达到98.1%,系统开销可以忽略不计,电池消耗不到2.4%。
{"title":"Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning","authors":"Wei-Han Lee, R. Lee","doi":"10.1109/DSN.2017.24","DOIUrl":"https://doi.org/10.1109/DSN.2017.24","url":null,"abstract":"Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphone user based on behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We propose novel context-based authentication models to differentiate the legitimate smartphone owner versus other users. We systematically show how to achieve high authentication accuracy with different design alternatives in sensor and feature selection, machine learning techniques, context detection and multiple devices. Our system can achieve excellent authentication performance with 98.1% accuracy with negligible system overhead and less than 2.4% battery consumption.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123871014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Sensor-Based Implicit Authentication of Smartphone Users 基于传感器的智能手机用户隐式认证
Wei-Han Lee, R. Lee
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphone user based on behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We propose novel context-based authentication models to differentiate the legitimate smartphone owner versus other users. We systematically show how to achieve high authentication accuracy with different design alternatives in sensor and feature selection, machine learning techniques, context detection and multiple devices. Our system can achieve excellent authentication performance with 98.1% accuracy with negligible system overhead and less than 2.4% battery consumption.
智能手机用户的身份验证非常重要,因为智能手机中存储了大量敏感数据,智能手机也用于访问各种云数据和服务。然而,智能手机很容易被盗或被攻击者利用。除了初始登录之外,非常需要对继续访问安全关键服务和数据的最终用户进行重新身份验证。因此,本文提出了一种新的认证系统,利用智能手机中无处不在的传感器,基于行为特征对智能手机用户进行隐式连续认证。我们提出了新的基于上下文的身份验证模型,以区分合法的智能手机所有者与其他用户。我们系统地展示了如何在传感器和特征选择、机器学习技术、上下文检测和多设备中使用不同的设计方案来实现高认证准确性。我们的系统可以实现出色的认证性能,准确率达到98.1%,系统开销可以忽略不计,电池消耗不到2.4%。
{"title":"Sensor-Based Implicit Authentication of Smartphone Users","authors":"Wei-Han Lee, R. Lee","doi":"10.1109/DSN.2017.21","DOIUrl":"https://doi.org/10.1109/DSN.2017.21","url":null,"abstract":"Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphone user based on behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We propose novel context-based authentication models to differentiate the legitimate smartphone owner versus other users. We systematically show how to achieve high authentication accuracy with different design alternatives in sensor and feature selection, machine learning techniques, context detection and multiple devices. Our system can achieve excellent authentication performance with 98.1% accuracy with negligible system overhead and less than 2.4% battery consumption.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133695778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks Athena:软件定义网络中可扩展异常检测的框架
Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, V. Yegneswaran
Network-based anomaly detection is a well-mined area of research, with many projects that have produced algorithms to detect suspicious and anomalous activities at strategic points in a network. In this paper, we examine how to integrate an anomaly detection development framework into existing software-defined network (SDN) infrastructures to support sophisticated anomaly detection services across the entire network data plane, not just at network egress boundaries. We present Athena as a new SDN-based software solution that exports a well-structured development interface and provides general purpose functions for rapidly synthesizing a wide range of anomaly detection services and network monitoring functions with minimal programming effort. Athena is a fully distributed application hosting architecture, enabling a unique degree of scalability from prior SDN security monitoring and analysis projects. We discuss example use-case scenarios with Athena's development libraries, and evaluate system performance with respect to usability, scalability, and overhead in real world environments.
基于网络的异常检测是一个成熟的研究领域,许多项目已经产生了算法来检测网络中战略点的可疑和异常活动。在本文中,我们研究了如何将异常检测开发框架集成到现有的软件定义网络(SDN)基础设施中,以支持跨整个网络数据平面的复杂异常检测服务,而不仅仅是在网络出口边界。我们提出雅典娜作为一个新的基于sdn的软件解决方案,输出一个结构良好的开发接口,并提供通用功能,快速合成范围广泛的异常检测服务和网络监控功能,只需最少的编程工作。Athena是一个完全分布式的应用程序托管架构,与之前的SDN安全监控和分析项目相比,它具有独特的可扩展性。我们将讨论使用Athena开发库的示例用例场景,并根据实际环境中的可用性、可伸缩性和开销来评估系统性能。
{"title":"Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks","authors":"Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, V. Yegneswaran","doi":"10.1109/DSN.2017.42","DOIUrl":"https://doi.org/10.1109/DSN.2017.42","url":null,"abstract":"Network-based anomaly detection is a well-mined area of research, with many projects that have produced algorithms to detect suspicious and anomalous activities at strategic points in a network. In this paper, we examine how to integrate an anomaly detection development framework into existing software-defined network (SDN) infrastructures to support sophisticated anomaly detection services across the entire network data plane, not just at network egress boundaries. We present Athena as a new SDN-based software solution that exports a well-structured development interface and provides general purpose functions for rapidly synthesizing a wide range of anomaly detection services and network monitoring functions with minimal programming effort. Athena is a fully distributed application hosting architecture, enabling a unique degree of scalability from prior SDN security monitoring and analysis projects. We discuss example use-case scenarios with Athena's development libraries, and evaluate system performance with respect to usability, scalability, and overhead in real world environments.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds ContainerLeaks:容器云中信息泄露的新安全威胁
Xing Gao, Zhongshu Gu, M. Kayaalp, D. Pendarakis, Haining Wang
Container technology provides a lightweight operating system level virtual hosting environment. Its emergence profoundly changes the development and deployment paradigms of multi-tier distributed applications. However, due to the incomplete implementation of system resource isolation mechanisms in the Linux kernel, some security concerns still exist for multiple containers sharing an operating system kernel on a multi-tenancy container cloud service. In this paper, we first present the information leakage channels we discovered that are accessible within the containers. Such channels expose a spectrum of system-wide host information to the containers without proper resource partitioning. By exploiting such leaked host information, it becomes much easier for malicious adversaries (acting as tenants in the container clouds) to launch advanced attacks that might impact the reliability of cloud services. Additionally, we discuss the root causes of the containers' information leakages and propose a two-stage defense approach. As demonstrated in the evaluation, our solution is effective and incurs trivial performance overhead.
容器技术提供了一个轻量级的操作系统级虚拟主机环境。它的出现深刻地改变了多层分布式应用程序的开发和部署范式。但是,由于Linux内核中系统资源隔离机制的实现不完整,对于在多租户容器云服务上共享操作系统内核的多个容器来说,仍然存在一些安全问题。在本文中,我们首先介绍了我们发现的在容器内可访问的信息泄漏通道。这样的通道向容器公开了一系列系统范围的主机信息,而没有进行适当的资源分区。通过利用这些泄露的主机信息,恶意攻击者(充当容器云中的租户)更容易发起可能影响云服务可靠性的高级攻击。此外,我们还讨论了容器信息泄漏的根本原因,并提出了两阶段防御方法。正如在评估中所演示的,我们的解决方案是有效的,并且产生了微不足道的性能开销。
{"title":"ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds","authors":"Xing Gao, Zhongshu Gu, M. Kayaalp, D. Pendarakis, Haining Wang","doi":"10.1109/DSN.2017.49","DOIUrl":"https://doi.org/10.1109/DSN.2017.49","url":null,"abstract":"Container technology provides a lightweight operating system level virtual hosting environment. Its emergence profoundly changes the development and deployment paradigms of multi-tier distributed applications. However, due to the incomplete implementation of system resource isolation mechanisms in the Linux kernel, some security concerns still exist for multiple containers sharing an operating system kernel on a multi-tenancy container cloud service. In this paper, we first present the information leakage channels we discovered that are accessible within the containers. Such channels expose a spectrum of system-wide host information to the containers without proper resource partitioning. By exploiting such leaked host information, it becomes much easier for malicious adversaries (acting as tenants in the container clouds) to launch advanced attacks that might impact the reliability of cloud services. Additionally, we discuss the root causes of the containers' information leakages and propose a two-stage defense approach. As demonstrated in the evaluation, our solution is effective and incurs trivial performance overhead.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125214020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium 平衡攻击或为什么可分叉区块链不适合联盟
Christopher Natoli, V. Gramoli
Most blockchain systems are forkable in that they require participants to agree on a chain out of multiple possible branches of blocks. In this paper, we identify a new form of attack, called the Balance attack, against these forkable blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the tradeoff between the network delay and the mining power of the attacker needed to double-spend in the GHOST protocol with high probability. We quantify our analysis in the settings of the Ethereum testnet of the R3 consortium where we show that a single machine needs to delay messages for 20 minutes to double spend while a coalition with a third of the mining power would simply need 4 minutes to double spend with 94% of success. We experiment the attack in our private Ethereum chain before arguing for a non-forkable blockchain design to protect against Balance attacks.
大多数区块链系统都是可分叉的,因为它们需要参与者在多个可能的区块分支中达成一致。在本文中,我们确定了一种新的攻击形式,称为平衡攻击,针对这些可分叉的区块链系统。这种攻击的新颖之处在于,它延迟了挖矿能力均衡的多个节点子组之间的网络通信。我们的理论分析抓住了网络延迟和攻击者在GHOST协议中高概率双花所需的挖矿能力之间的权衡。我们在R3联盟的以太坊测试网的设置中量化了我们的分析,我们表明一台机器需要延迟20分钟的消息才能翻倍,而拥有三分之一挖矿能力的联盟只需要4分钟就可以翻倍,成功率为94%。我们在我们的私有以太坊链上进行了攻击实验,然后提出了一个不可忽视的区块链设计来防止平衡攻击。
{"title":"The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium","authors":"Christopher Natoli, V. Gramoli","doi":"10.1109/DSN.2017.44","DOIUrl":"https://doi.org/10.1109/DSN.2017.44","url":null,"abstract":"Most blockchain systems are forkable in that they require participants to agree on a chain out of multiple possible branches of blocks. In this paper, we identify a new form of attack, called the Balance attack, against these forkable blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the tradeoff between the network delay and the mining power of the attacker needed to double-spend in the GHOST protocol with high probability. We quantify our analysis in the settings of the Ethereum testnet of the R3 consortium where we show that a single machine needs to delay messages for 20 minutes to double spend while a coalition with a third of the mining power would simply need 4 minutes to double spend with 94% of success. We experiment the attack in our private Ethereum chain before arguing for a non-forkable blockchain design to protect against Balance attacks.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"116 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131177626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Information Leakage in Encrypted Deduplication via Frequency Analysis 基于频率分析的加密重复数据删除中的信息泄露
Jingwei Li, Chuan Qin, P. Lee, Xiaosong Zhang
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a deterministic encryption approach that encrypts each plaintext chunk with a key derived from the content of the chunk itself, so that identical plaintext chunks are always encrypted into identical ciphertext chunks for deduplication. However, such deterministic encryption inherently reveals the underlying frequency distribution of the original plaintext chunks. This allows an adversary to launch frequency analysis against the resulting ciphertext chunks, and ultimately infer the content of the original plaintext chunks. In this paper, we study how frequency analysis practically affects information leakage in encrypted deduplication storage, from both attack and defense perspectives. We first propose a new inference attack that exploits chunk locality to increase the coverage of inferred chunks. We conduct trace-driven evaluation on both real-world and synthetic datasets, and show that the new inference attack can infer a significant fraction of plaintext chunks under backup workloads. To protect against frequency analysis, we borrow the idea of existing performance-driven deduplication approaches and consider an encryption scheme called MinHash encryption, which disturbs the frequency rank of ciphertext chunks by encrypting some identical plaintext chunks into multiple distinct ciphertext chunks. Our trace-driven evaluation shows that MinHash encryption effectively mitigates the inference attack, while maintaining high storage efficiency.
加密重复数据删除将加密和重复数据删除无缝结合,同时实现数据安全性和存储效率。最先进的加密重复数据删除系统大多采用确定性加密方法,使用从数据块本身的内容派生的密钥对每个明文块进行加密,以便始终将相同的明文块加密为相同的密文块进行重复数据删除。然而,这种确定性加密本质上揭示了原始明文块的底层频率分布。这允许攻击者对生成的密文块进行频率分析,并最终推断出原始明文块的内容。本文从攻击和防御两个角度研究了频率分析对重复数据删除加密存储中信息泄漏的实际影响。我们首先提出了一种新的推理攻击,利用块局部性来增加推断块的覆盖范围。我们对真实世界和合成数据集进行了跟踪驱动的评估,并表明新的推理攻击可以在备份工作负载下推断出相当一部分明文块。为了防止频率分析,我们借用了现有的性能驱动的重复数据删除方法的思想,并考虑了一种称为MinHash加密的加密方案,该方案通过将一些相同的明文块加密成多个不同的密文块来干扰密文块的频率等级。我们的跟踪驱动评估表明,MinHash加密有效地减轻了推理攻击,同时保持了较高的存储效率。
{"title":"Information Leakage in Encrypted Deduplication via Frequency Analysis","authors":"Jingwei Li, Chuan Qin, P. Lee, Xiaosong Zhang","doi":"10.1109/DSN.2017.28","DOIUrl":"https://doi.org/10.1109/DSN.2017.28","url":null,"abstract":"Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a deterministic encryption approach that encrypts each plaintext chunk with a key derived from the content of the chunk itself, so that identical plaintext chunks are always encrypted into identical ciphertext chunks for deduplication. However, such deterministic encryption inherently reveals the underlying frequency distribution of the original plaintext chunks. This allows an adversary to launch frequency analysis against the resulting ciphertext chunks, and ultimately infer the content of the original plaintext chunks. In this paper, we study how frequency analysis practically affects information leakage in encrypted deduplication storage, from both attack and defense perspectives. We first propose a new inference attack that exploits chunk locality to increase the coverage of inferred chunks. We conduct trace-driven evaluation on both real-world and synthetic datasets, and show that the new inference attack can infer a significant fraction of plaintext chunks under backup workloads. To protect against frequency analysis, we borrow the idea of existing performance-driven deduplication approaches and consider an encryption scheme called MinHash encryption, which disturbs the frequency rank of ciphertext chunks by encrypting some identical plaintext chunks into multiple distinct ciphertext chunks. Our trace-driven evaluation shows that MinHash encryption effectively mitigates the inference attack, while maintaining high storage efficiency.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125793498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System 基于动态故障树分析的智能维修:以新加坡捷运系统为例
Yan Liu, Yue Wu, Z. Kalbarczyk
Urban railway systems, as the most heavily used systems in daily life, suffer from frequent service disruptions resulting millions of affected passengers and huge economic losses. Maintenance of the systems is done by maintaining individual devices in fixed cycles. It is time consuming, yet not effective. Thus, to reduce service failures through smart maintenance is becoming one of the top priorities of the system operators. In this paper, we propose a data driven approach that is to decide maintenance cycle based on estimating the mean time to failure of the system. There are two challenges: 1) as a cyber physical system, hardwares of cyber components (like signalling devices) fail more frequently than physical components (like power plants), 2) as a system of systems, functional dependency exists not only between components within a sub-system but also between different sub-systems, for example, a train relies on traction power system to operate. To meet the challenges, a Dynamic Fault Tree (DFT) based approach is adopted for the expressiveness of the modelling formalism and an efficient tool support by DFTCalc. Our case study shows interesting results that the Singapore Massive Rapid Train (MRT) system is likely to fail in 20 days from the full functioning status based on the manufacture data.
城市铁路系统作为日常生活中使用最频繁的系统,经常遭受服务中断,导致数百万乘客受到影响,并造成巨大的经济损失。系统的维护是通过在固定周期内维护单个设备来完成的。这是耗时的,但没有效果。因此,通过智能维护减少服务故障已成为系统运营商的首要任务之一。在本文中,我们提出了一种基于估计系统平均故障间隔时间的数据驱动方法来决定维护周期。有两个挑战:1)作为一个网络物理系统,网络组件的硬件(如信号设备)比物理组件(如发电厂)更频繁地故障,2)作为一个系统的系统,功能依赖不仅存在于子系统内的组件之间,也存在于不同子系统之间,例如,火车依赖牵引动力系统运行。为了应对这一挑战,采用了基于动态故障树(DFT)的建模形式表达方法和DFTCalc支持的有效工具。我们的案例研究显示了有趣的结果,即根据制造数据,新加坡大规模快速列车(MRT)系统可能在20天内从完全运行状态失效。
{"title":"Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System","authors":"Yan Liu, Yue Wu, Z. Kalbarczyk","doi":"10.1109/DSN.2017.50","DOIUrl":"https://doi.org/10.1109/DSN.2017.50","url":null,"abstract":"Urban railway systems, as the most heavily used systems in daily life, suffer from frequent service disruptions resulting millions of affected passengers and huge economic losses. Maintenance of the systems is done by maintaining individual devices in fixed cycles. It is time consuming, yet not effective. Thus, to reduce service failures through smart maintenance is becoming one of the top priorities of the system operators. In this paper, we propose a data driven approach that is to decide maintenance cycle based on estimating the mean time to failure of the system. There are two challenges: 1) as a cyber physical system, hardwares of cyber components (like signalling devices) fail more frequently than physical components (like power plants), 2) as a system of systems, functional dependency exists not only between components within a sub-system but also between different sub-systems, for example, a train relies on traction power system to operate. To meet the challenges, a Dynamic Fault Tree (DFT) based approach is adopted for the expressiveness of the modelling formalism and an efficient tool support by DFTCalc. Our case study shows interesting results that the Singapore Massive Rapid Train (MRT) system is likely to fail in 20 days from the full functioning status based on the manufacture data.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks 基于包签名和LSTM网络的工业控制系统多级异常检测
Cheng Feng, Tingting Li, D. Chana
We outline an anomaly detection method for industrial control systems (ICS) that combines the analysis of network package contents that are transacted between ICS nodes and their time-series structure. Specifically, we take advantage of the predictable and regular nature of communication patterns that exist between so-called field devices in ICS networks. By observing a system for a period of time without the presence of anomalies we develop a base-line signature database for general packages. A Bloom filter is used to store the signature database which is then used for package content level anomaly detection. Furthermore, we approach time-series anomaly detection by proposing a stacked Long Short Term Memory (LSTM) network-based softmax classifier which learns to predict the most likely package signatures that are likely to occur given previously seen package traffic. Finally, by the inspection of a real dataset created from a gas pipeline SCADA system, we show that an anomaly detection scheme combining both approaches can achieve higher performance compared to various current state-of-the-art techniques.
我们概述了一种工业控制系统(ICS)的异常检测方法,该方法结合了对ICS节点之间处理的网络包内容及其时间序列结构的分析。具体来说,我们利用了ICS网络中所谓的现场设备之间存在的通信模式的可预测性和规律性。通过观察一个系统一段时间没有异常的存在,我们开发了一个一般包的基线特征数据库。布隆过滤器用于存储特征库,然后用于包内容级异常检测。此外,我们通过提出一种基于堆叠长短期记忆(LSTM)网络的softmax分类器来处理时间序列异常检测,该分类器学习预测最可能发生的数据包签名,这些签名可能是给定先前看到的数据包流量的。最后,通过对天然气管道SCADA系统创建的真实数据集的检查,我们表明,与当前各种最先进的技术相比,结合这两种方法的异常检测方案可以实现更高的性能。
{"title":"Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks","authors":"Cheng Feng, Tingting Li, D. Chana","doi":"10.1109/DSN.2017.34","DOIUrl":"https://doi.org/10.1109/DSN.2017.34","url":null,"abstract":"We outline an anomaly detection method for industrial control systems (ICS) that combines the analysis of network package contents that are transacted between ICS nodes and their time-series structure. Specifically, we take advantage of the predictable and regular nature of communication patterns that exist between so-called field devices in ICS networks. By observing a system for a period of time without the presence of anomalies we develop a base-line signature database for general packages. A Bloom filter is used to store the signature database which is then used for package content level anomaly detection. Furthermore, we approach time-series anomaly detection by proposing a stacked Long Short Term Memory (LSTM) network-based softmax classifier which learns to predict the most likely package signatures that are likely to occur given previously seen package traffic. Finally, by the inspection of a real dataset created from a gas pipeline SCADA system, we show that an anomaly detection scheme combining both approaches can achieve higher performance compared to various current state-of-the-art techniques.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
期刊
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1