首页 > 最新文献

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency 通过性能-技巧不一致性检测网络游戏中的被动作弊
Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, A. Stavrou
As the most commonly used bots in first-person shooter (FPS) online games, aimbots are notoriously difficult to detect because they are completely passive and resemble excellent honest players in many aspects. In this paper, we conduct the first field measurement study to understand the status quo of aimbots and how they play in the wild. For data collection purpose, we devise a novel and generic technique called baittarget to accurately capture existing aimbots from the two most popular FPS games. Our measurement reveals that cheaters who use aimbots cannot play as skillful as excellent honest players in all aspects even though aimbots can help them to achieve very high shooting performance. To characterize the unskillful and blatant nature of cheaters, we identify seven features, of which six are novel, and these features cannot be easily mimicked by aimbots. Leveraging this set of features, we propose an accurate and robust server-side aimbot detector called AimDetect. The core of AimDetect is a cascaded classifier that detects the inconsistency between performance and skillfulness of aimbots. We evaluate the efficacy and generality of AimDetect using the real game traces. Our results show that AimDetect can capture almost all of the aimbots with very few false positives and minor overhead.
作为第一人称射击(FPS)在线游戏中最常用的bot, aimbots很难被发现,因为它们是完全被动的,并且在许多方面与优秀的诚实玩家相似。在本文中,我们进行了第一次实地测量研究,以了解aimbots的现状以及它们在野外的表现。为了收集数据,我们设计了一种名为“诱饵目标”的新颖通用技术,以准确捕获两款最受欢迎的FPS游戏中现有的瞄准机器人。我们的测量结果显示,使用瞄准机器人的作弊者在所有方面都不如优秀的诚实玩家,尽管瞄准机器人可以帮助他们获得很高的射击表现。为了描述作弊者不熟练和公然的本质,我们确定了7个特征,其中6个是新颖的,这些特征不容易被目标机器人模仿。利用这组功能,我们提出了一个准确而健壮的服务器端目标机器人检测器,称为AimDetect。AimDetect的核心是一个级联分类器,用于检测aibots的性能和技巧之间的不一致性。我们使用真实的游戏轨迹来评估AimDetect的有效性和通用性。我们的结果表明,AimDetect可以捕获几乎所有的目标机器人,并且很少有误报和很小的开销。
{"title":"Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency","authors":"Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, A. Stavrou","doi":"10.1109/DSN.2017.20","DOIUrl":"https://doi.org/10.1109/DSN.2017.20","url":null,"abstract":"As the most commonly used bots in first-person shooter (FPS) online games, aimbots are notoriously difficult to detect because they are completely passive and resemble excellent honest players in many aspects. In this paper, we conduct the first field measurement study to understand the status quo of aimbots and how they play in the wild. For data collection purpose, we devise a novel and generic technique called baittarget to accurately capture existing aimbots from the two most popular FPS games. Our measurement reveals that cheaters who use aimbots cannot play as skillful as excellent honest players in all aspects even though aimbots can help them to achieve very high shooting performance. To characterize the unskillful and blatant nature of cheaters, we identify seven features, of which six are novel, and these features cannot be easily mimicked by aimbots. Leveraging this set of features, we propose an accurate and robust server-side aimbot detector called AimDetect. The core of AimDetect is a cascaded classifier that detects the inconsistency between performance and skillfulness of aimbots. We evaluate the efficacy and generality of AimDetect using the real game traces. Our results show that AimDetect can capture almost all of the aimbots with very few false positives and minor overhead.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130562407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
What Can We Learn from Four Years of Data Center Hardware Failures? 我们能从四年的数据中心硬件故障中学到什么?
Guosai Wang, Lifei Zhang, W. Xu
Hardware failures have a big impact on the dependability of large-scale data centers. We present studies on over 290,000 hardware failure reports collected over the past four years from dozens of data centers with hundreds of thousands of servers. We examine the dataset statistically to discover failure characteristics along the temporal, spatial, product line and component dimensions. We specifically focus on the correlations among different failures, including batch and repeating failures, as well as the human operators' response to the failures. We reconfirm or extend findings from previous studies. We also find many new failure and recovery patterns that are the undesirable by-product of the state-of-the-art data center hardware and software design.
硬件故障对大型数据中心的可靠性影响很大。在过去的四年里,我们从数十个拥有数十万台服务器的数据中心收集了超过290,000份硬件故障报告。我们对数据集进行统计检查,以发现沿时间、空间、产品线和组件维度的故障特征。我们特别关注不同故障之间的相关性,包括批量和重复故障,以及人类操作员对故障的响应。我们重新确认或扩展了以前的研究结果。我们还发现了许多新的故障和恢复模式,它们是最先进的数据中心硬件和软件设计的不良副产品。
{"title":"What Can We Learn from Four Years of Data Center Hardware Failures?","authors":"Guosai Wang, Lifei Zhang, W. Xu","doi":"10.1109/DSN.2017.26","DOIUrl":"https://doi.org/10.1109/DSN.2017.26","url":null,"abstract":"Hardware failures have a big impact on the dependability of large-scale data centers. We present studies on over 290,000 hardware failure reports collected over the past four years from dozens of data centers with hundreds of thousands of servers. We examine the dataset statistically to discover failure characteristics along the temporal, spatial, product line and component dimensions. We specifically focus on the correlations among different failures, including batch and repeating failures, as well as the human operators' response to the failures. We reconfirm or extend findings from previous studies. We also find many new failure and recovery patterns that are the undesirable by-product of the state-of-the-art data center hardware and software design.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone IM-Visor:一个Pre-IME警卫,以防止IME应用程序窃取使用TrustZone的敏感按键
Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Cheng Zhang, Zhen Xu
Third-party IME (Input Method Editor) apps are often the preference means of interaction for Android users' input. In this paper, we first discuss the insecurity of IME apps, including the Potentially Harmful Apps (PHA) and malicious IME apps, which may leak users' sensitive keystrokes. The current defense system, such as I-BOX, is vulnerable to the prefix-substitution attack and the colluding attack due to the post-IME nature. We provide a deeper understanding that all the designs with the post-IME nature are subject to the prefix-substitution and colluding attacks. To remedy the above post-IME system's flaws, we propose a new idea, pre-IME, which guarantees that "Is this touch event a sensitive keystroke?" analysis will always access user touch events prior to the execution of any IME app code. We designed an innovative TrustZone-based framework named IM-Visor which has the pre-IME nature. Specifically, IM-Visor creates the isolation environment named STIE as soon as a user intends to type on a soft keyboard, then the STIE intercepts, translates and analyzes the user's touch input. If the input is sensitive, the translation of keystrokes will be delivered to user apps through a trusted path. Otherwise, IM-Visor replays non-sensitive keystroke touch events for IME apps or replays non-keystroke touch events for other apps. A prototype of IM-Visor has been implemented and tested with several most popular IMEs. The experimental results show that IM-Visor has small runtime overheads.
第三方输入法编辑器(IME)应用程序通常是Android用户输入的首选交互方式。在本文中,我们首先讨论了IME应用程序的不安全性,包括潜在有害应用程序(PHA)和恶意IME应用程序,它们可能会泄露用户的敏感按键。目前的防御系统,如I-BOX,由于后ime的性质,容易受到前缀替换攻击和串通攻击。我们提供了一个更深入的理解,所有具有后ime性质的设计都受到前缀替换和串通攻击。为了弥补上述后IME系统的缺陷,我们提出了一个新的想法,pre-IME,它保证“这个触摸事件是一个敏感的击键吗?”分析总是在执行任何IME应用程序代码之前访问用户触摸事件。我们设计了一个创新的基于trustzone的框架,名为IM-Visor,它具有前ime的性质。具体来说,IM-Visor创建了名为STIE的隔离环境,一旦用户打算在软键盘上输入,STIE就会拦截、翻译和分析用户的触摸输入。如果输入是敏感的,键击的翻译将通过可信路径传递给用户应用程序。否则,IM-Visor会为IME应用程序回放非敏感的击键触摸事件,或为其他应用程序回放非击键触摸事件。IM-Visor的原型已经在几个最流行的im上实现和测试。实验结果表明,IM-Visor具有较小的运行时间开销。
{"title":"IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone","authors":"Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Cheng Zhang, Zhen Xu","doi":"10.1109/DSN.2017.12","DOIUrl":"https://doi.org/10.1109/DSN.2017.12","url":null,"abstract":"Third-party IME (Input Method Editor) apps are often the preference means of interaction for Android users' input. In this paper, we first discuss the insecurity of IME apps, including the Potentially Harmful Apps (PHA) and malicious IME apps, which may leak users' sensitive keystrokes. The current defense system, such as I-BOX, is vulnerable to the prefix-substitution attack and the colluding attack due to the post-IME nature. We provide a deeper understanding that all the designs with the post-IME nature are subject to the prefix-substitution and colluding attacks. To remedy the above post-IME system's flaws, we propose a new idea, pre-IME, which guarantees that \"Is this touch event a sensitive keystroke?\" analysis will always access user touch events prior to the execution of any IME app code. We designed an innovative TrustZone-based framework named IM-Visor which has the pre-IME nature. Specifically, IM-Visor creates the isolation environment named STIE as soon as a user intends to type on a soft keyboard, then the STIE intercepts, translates and analyzes the user's touch input. If the input is sensitive, the translation of keystrokes will be delivered to user apps through a trusted path. Otherwise, IM-Visor replays non-sensitive keystroke touch events for IME apps or replays non-keystroke touch events for other apps. A prototype of IM-Visor has been implemented and tested with several most popular IMEs. The experimental results show that IM-Visor has small runtime overheads.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127992629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters RL-BLH:基于学习的智能电表成本节约和隐私保护电池控制
Jinkyu Koo, Xiaojun Lin, S. Bagchi
An emerging solution to privacy issues in smart grids is battery-based load hiding (BLH) that uses a rechargeable battery to decouple the meter readings from user activities. However, existing BLH algorithms have two significant limitations: (1) Most of them focus on flattening high-frequency variation of usage profile only, thereby still revealing a low-frequency shape, (2) Otherwise, they assume to know a statistical model of usage pattern. To overcome these limitations, we propose a new BLH algorithm, named RL-BLH. The RL-BLH hides both low-frequency and high-frequency usage patterns by shaping the meter readings to rectangular pulses. The RL-BLH learns a decision policy for choosing pulse magnitudes on the fly without prior knowledge of usage pattern. The decision policy is designed to charge and discharge the battery in the optimal way to maximize cost savings. We also provide heuristics to shorten learning time and improve cost savings.
针对智能电网的隐私问题,一种新兴的解决方案是基于电池的负载隐藏(BLH),它使用可充电电池将电表读数与用户活动分离。然而,现有的BLH算法存在两个明显的局限性:(1)大多数算法只关注使用曲线的高频变化,从而仍然显示低频形状;(2)否则,它们假设知道使用模式的统计模型。为了克服这些限制,我们提出了一种新的BLH算法,命名为RL-BLH。RL-BLH通过将仪表读数塑造成矩形脉冲来隐藏低频和高频使用模式。RL-BLH在不事先了解使用模式的情况下学习动态选择脉冲幅度的决策策略。该决策策略旨在以最优方式对电池进行充放电,以最大限度地节省成本。我们还提供启发式方法来缩短学习时间和提高成本节约。
{"title":"RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters","authors":"Jinkyu Koo, Xiaojun Lin, S. Bagchi","doi":"10.1109/DSN.2017.16","DOIUrl":"https://doi.org/10.1109/DSN.2017.16","url":null,"abstract":"An emerging solution to privacy issues in smart grids is battery-based load hiding (BLH) that uses a rechargeable battery to decouple the meter readings from user activities. However, existing BLH algorithms have two significant limitations: (1) Most of them focus on flattening high-frequency variation of usage profile only, thereby still revealing a low-frequency shape, (2) Otherwise, they assume to know a statistical model of usage pattern. To overcome these limitations, we propose a new BLH algorithm, named RL-BLH. The RL-BLH hides both low-frequency and high-frequency usage patterns by shaping the meter readings to rectangular pulses. The RL-BLH learns a decision policy for choosing pulse magnitudes on the fly without prior knowledge of usage pattern. The decision policy is designed to charge and discharge the battery in the optimal way to maximize cost savings. We also provide heuristics to shorten learning time and improve cost savings.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130174480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks REMAX:可达性-最大限度地P2P检测的错误读数在无线传感器网络
V. Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, W. Sanders
Wireless sensor networks (WSNs) should collect accurate readings to reliably capture an environment's state. However, readings may become erroneous because of sensor hardware failures or degradation. In remote deployments, centrally detecting those reading errors can result in many message transmissions, which in turn dramatically decreases sensor battery life. In this paper, we address this issue through three main contributions. First, we propose REMAX, a peer-to-peer (P2P) error detection protocol that extends the WSN's life by minimizing message transmissions. Second, we propose a low-overhead error detection approach that helps minimize communication complexity. Third, we evaluate our approach via a trace-driven, discrete-event simulator, using two datasets from real WSN deployments that measure indoor air temperature and seismic wave amplitude. Our results show that REMAX can accurately detect errors and extend the WSN's reachability (effective lifetime) compared to the centralized approach.
无线传感器网络(wsn)应该收集准确的读数,以可靠地捕捉环境的状态。但是,由于传感器硬件故障或退化,读数可能会出错。在远程部署中,集中检测这些读取错误可能导致许多消息传输,从而大大缩短传感器电池寿命。在本文中,我们通过三个主要贡献来解决这个问题。首先,我们提出了REMAX,一种点对点(P2P)错误检测协议,通过最小化消息传输来延长WSN的寿命。其次,我们提出了一种低开销的错误检测方法,帮助最小化通信复杂性。第三,我们通过跟踪驱动的离散事件模拟器评估我们的方法,使用来自真实WSN部署的两个数据集来测量室内空气温度和地震波振幅。结果表明,与集中式方法相比,REMAX可以准确地检测错误,并延长WSN的可达性(有效寿命)。
{"title":"REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks","authors":"V. Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, W. Sanders","doi":"10.1109/DSN.2017.52","DOIUrl":"https://doi.org/10.1109/DSN.2017.52","url":null,"abstract":"Wireless sensor networks (WSNs) should collect accurate readings to reliably capture an environment's state. However, readings may become erroneous because of sensor hardware failures or degradation. In remote deployments, centrally detecting those reading errors can result in many message transmissions, which in turn dramatically decreases sensor battery life. In this paper, we address this issue through three main contributions. First, we propose REMAX, a peer-to-peer (P2P) error detection protocol that extends the WSN's life by minimizing message transmissions. Second, we propose a low-overhead error detection approach that helps minimize communication complexity. Third, we evaluate our approach via a trace-driven, discrete-event simulator, using two datasets from real WSN deployments that measure indoor air temperature and seismic wave amplitude. Our results show that REMAX can accurately detect errors and extend the WSN's reachability (effective lifetime) compared to the centralized approach.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysing Selfishness Flooding with SEINE 用塞纳河分析自私泛滥
Guido Lena Cota, Sonia Ben Mokhtar, G. Gianini, E. Damiani, J. Lawall, Gilles Muller, L. Brunie
Selfishness is one of the key problems that confronts developers of cooperative distributed systems (e.g., file-sharing networks, voluntary computing). It has the potential to severely degrade system performance and to lead to instability and failures. Current techniques for understanding the impact of selfish behaviours and designing effective countermeasures remain manual and time-consuming, requiring multi-domain expertise. To overcome these difficulties, we propose SEINE, a simulation framework for rapid modelling and evaluation of selfish behaviours in a cooperative system. SEINE relies on a domain-specific language (SEINE-L) for specifying selfishness scenarios, and provides semi-automatic support for their implementation and study in a state-of-the-art simulator. We show in this paper that (1) SEINE-L is expressive enough to specify fifteen selfishness scenarios taken from the literature, (2) SEINE is accurate in predicting the impact of selfishness compared to real experiments, and (3) SEINE substantially reduces the development effort compared to traditional manual approaches.
自私是协作式分布式系统(例如,文件共享网络,自愿计算)的开发者所面临的关键问题之一。它有可能严重降低系统性能,导致不稳定和故障。目前用于理解自私行为的影响和设计有效对策的技术仍然是手工和耗时的,需要多领域的专业知识。为了克服这些困难,我们提出了SEINE,一个用于快速建模和评估合作系统中自私行为的仿真框架。SEINE依赖于特定于领域的语言(SEINE- l)来指定自私场景,并在最先进的模拟器中为其实现和研究提供半自动支持。我们在本文中表明:(1)SEINE- l具有足够的表现力,可以指定从文献中提取的15种自私场景;(2)与真实实验相比,SEINE在预测自私的影响方面是准确的;(3)与传统的人工方法相比,SEINE大大减少了开发工作量。
{"title":"Analysing Selfishness Flooding with SEINE","authors":"Guido Lena Cota, Sonia Ben Mokhtar, G. Gianini, E. Damiani, J. Lawall, Gilles Muller, L. Brunie","doi":"10.1109/DSN.2017.51","DOIUrl":"https://doi.org/10.1109/DSN.2017.51","url":null,"abstract":"Selfishness is one of the key problems that confronts developers of cooperative distributed systems (e.g., file-sharing networks, voluntary computing). It has the potential to severely degrade system performance and to lead to instability and failures. Current techniques for understanding the impact of selfish behaviours and designing effective countermeasures remain manual and time-consuming, requiring multi-domain expertise. To overcome these difficulties, we propose SEINE, a simulation framework for rapid modelling and evaluation of selfish behaviours in a cooperative system. SEINE relies on a domain-specific language (SEINE-L) for specifying selfishness scenarios, and provides semi-automatic support for their implementation and study in a state-of-the-art simulator. We show in this paper that (1) SEINE-L is expressive enough to specify fifteen selfishness scenarios taken from the literature, (2) SEINE is accurate in predicting the impact of selfishness compared to real experiments, and (3) SEINE substantially reduces the development effort compared to traditional manual approaches.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon 你看到的不是你得到的!用变色龙挫败准时制ROP
Ping Chen, Jun Xu, Zhi-hao Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu
Address space randomization has long been used for counteracting code reuse attacks, ranging from conventional ROP to sophisticated Just-in-Time ROP. At the high level, it shuffles program code in memory and thus prevents malicious ROP payload from performing arbitrary operations. While effective in mitigating attacks, existing randomization mechanisms are impractical for real-world applications and systems, especially considering the significant performance overhead and potential program corruption incurred by their implementation. In this paper, we introduce CHAMELEON, a practical defense mechanism that hinders code reuse attacks, particularly Just-in-Time ROP attacks. Technically speaking, CHAMELEON instruments program code, randomly shuffles code page addresses and minimizes the attack surface exposed to adversaries. While this defense mechanism follows in the footprints of address space randomization, our design principle focuses on using randomization to obstruct code page disclosure, making the ensuing attacks infeasible. We implemented a prototype of CHAMELEON on Linux operating system and extensively experimented it in different settings. Our theoretical and empirical evaluation indicates the effectiveness and efficiency of CHAMELEON in thwarting Just-in-Time ROP attacks.
地址空间随机化长期以来一直用于对抗代码重用攻击,从传统的ROP到复杂的即时ROP。在高层,它在内存中打乱程序代码,从而防止恶意ROP有效负载执行任意操作。虽然可以有效地减轻攻击,但现有的随机化机制对于现实世界的应用程序和系统来说是不切实际的,特别是考虑到它们的实现带来的巨大性能开销和潜在的程序损坏。在本文中,我们介绍了变色龙,这是一种实用的防御机制,可以阻止代码重用攻击,特别是即时ROP攻击。从技术上讲,变色龙仪器程序代码,随机打乱代码页地址和最小化攻击面暴露给对手。虽然这种防御机制遵循地址空间随机化的足迹,但我们的设计原则侧重于使用随机化来阻止代码页泄露,使随后的攻击无法实现。我们在Linux操作系统上实现了CHAMELEON的原型,并在不同的设置下进行了广泛的实验。我们的理论和实证评估表明变色龙在挫败准时制ROP攻击方面的有效性和效率。
{"title":"What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon","authors":"Ping Chen, Jun Xu, Zhi-hao Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu","doi":"10.1109/DSN.2017.47","DOIUrl":"https://doi.org/10.1109/DSN.2017.47","url":null,"abstract":"Address space randomization has long been used for counteracting code reuse attacks, ranging from conventional ROP to sophisticated Just-in-Time ROP. At the high level, it shuffles program code in memory and thus prevents malicious ROP payload from performing arbitrary operations. While effective in mitigating attacks, existing randomization mechanisms are impractical for real-world applications and systems, especially considering the significant performance overhead and potential program corruption incurred by their implementation. In this paper, we introduce CHAMELEON, a practical defense mechanism that hinders code reuse attacks, particularly Just-in-Time ROP attacks. Technically speaking, CHAMELEON instruments program code, randomly shuffles code page addresses and minimizes the attack surface exposed to adversaries. While this defense mechanism follows in the footprints of address space randomization, our design principle focuses on using randomization to obstruct code page disclosure, making the ensuing attacks infeasible. We implemented a prototype of CHAMELEON on Linux operating system and extensively experimented it in different settings. Our theoretical and empirical evaluation indicates the effectiveness and efficiency of CHAMELEON in thwarting Just-in-Time ROP attacks.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection DynaMiner:利用离线感染分析进行在线恶意软件检测
Birhanu Eshete, V. Venkatakrishnan
Web-borne malware continues to be a major threat on the Web. At the core of malware infection are for-crime toolkits that exploit vulnerabilities in browsers and their extensions. When a victim host gets infected, the infection dynamics is often buried in benign traffic, which makes the task of inferring malicious behavior a non-trivial exercise. In this paper, we leverage web conversation graph analytics to tap into the rich dynamics of the interaction between a victim and malicious host(s) without the need for analyzing exploit payload. Based on insights derived from infection graph analytics, we formulate the malware detection challenge as a graph-analytics based learning problem. The key insight of our approach is the payload-agnostic abstraction and comprehensive analytics of malware infection dynamics pre-, during-, and post-infection. Our technique leverages 3 years of infection intelligence spanning 9 popular exploit kit families. Our approach is implemented in a tool called DynaMiner and evaluated on infection and benign HTTP traffic. DynaMiner achieves a 97.3% true positive rate with false positive rate of 1.5%. Our forensic and live case studies suggest the effectiveness of comprehensive graph abstraction malware infection. In some instances, DynaMiner detected unknown malware 11 days earlier than existing AV engines.
网络恶意软件仍然是网络上的主要威胁。恶意软件感染的核心是利用浏览器及其扩展漏洞的犯罪工具包。当受害者主机被感染时,感染动态通常隐藏在良性流量中,这使得推断恶意行为的任务成为一项重要的工作。在本文中,我们利用web会话图分析来挖掘受害者和恶意主机之间交互的丰富动态,而无需分析漏洞有效载荷。基于来自感染图分析的见解,我们将恶意软件检测挑战制定为基于图分析的学习问题。我们的方法的关键洞察力是有效载荷不可知的抽象和全面分析恶意软件感染动态前,期间和感染后。我们的技术利用了3年的感染情报,涵盖了9个流行的漏洞利用工具包家族。我们的方法是在一个名为DynaMiner的工具中实现的,并对感染和良性HTTP流量进行评估。DynaMiner的真阳性率97.3%,假阳性率1.5%。我们的取证和现场案例研究表明,综合图形抽象恶意软件感染的有效性。在某些情况下,DynaMiner比现有的AV引擎早11天检测到未知恶意软件。
{"title":"DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection","authors":"Birhanu Eshete, V. Venkatakrishnan","doi":"10.1109/DSN.2017.54","DOIUrl":"https://doi.org/10.1109/DSN.2017.54","url":null,"abstract":"Web-borne malware continues to be a major threat on the Web. At the core of malware infection are for-crime toolkits that exploit vulnerabilities in browsers and their extensions. When a victim host gets infected, the infection dynamics is often buried in benign traffic, which makes the task of inferring malicious behavior a non-trivial exercise. In this paper, we leverage web conversation graph analytics to tap into the rich dynamics of the interaction between a victim and malicious host(s) without the need for analyzing exploit payload. Based on insights derived from infection graph analytics, we formulate the malware detection challenge as a graph-analytics based learning problem. The key insight of our approach is the payload-agnostic abstraction and comprehensive analytics of malware infection dynamics pre-, during-, and post-infection. Our technique leverages 3 years of infection intelligence spanning 9 popular exploit kit families. Our approach is implemented in a tool called DynaMiner and evaluated on infection and benign HTTP traffic. DynaMiner achieves a 97.3% true positive rate with false positive rate of 1.5%. Our forensic and live case studies suggest the effectiveness of comprehensive graph abstraction malware infection. In some instances, DynaMiner detected unknown malware 11 days earlier than existing AV engines.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114080667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet 在黑暗中计数:互联网中的DNS缓存发现和枚举
Amit Klein, Haya Schulmann, M. Waidner
Domain Name System (DNS) is a fundamental element of the Internet providing lookup services for end users as well as for a multitude of applications, systems and security mechanisms that depend on DNS, such as antispam defences, routing security, firewalls, certificates and more. Caches constitute a critical component of DNS, allowing to improve efficiency and reduce latency and traffic in the Internet. Understanding the behaviour, configurations and topologies of caches in the DNS platforms in the Internet is important for efficiency and security of Internet users and services. In this work we present methodologies for efficiently discovering and enumerating the caches of the DNS resolution platforms in the Internet. We apply our techniques and methodologies for studying caches in popular DNS resolution platforms in the Internet. Our study includes networks of major ISPs, enterprises and professionally managed open DNS resolvers. The results of our Internet measurements shed light on architectures and configurations of the caches in DNS resolution platforms.
域名系统(DNS)是互联网的基本元素,为最终用户以及依赖于DNS的众多应用程序、系统和安全机制提供查找服务,例如反垃圾邮件防御、路由安全、防火墙、证书等。缓存是DNS的关键组成部分,可以提高效率,减少Internet中的延迟和流量。了解互联网上DNS平台中的缓存的行为、配置和拓扑结构对互联网用户和服务的效率和安全性非常重要。在这项工作中,我们提出了有效地发现和列举互联网上DNS解析平台缓存的方法。我们应用我们的技术和方法来研究互联网上流行的DNS解析平台中的缓存。我们的研究包括主要isp、企业和专业管理的开放式DNS解析器的网络。我们的互联网测量结果揭示了DNS解析平台中缓存的架构和配置。
{"title":"Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet","authors":"Amit Klein, Haya Schulmann, M. Waidner","doi":"10.1109/DSN.2017.63","DOIUrl":"https://doi.org/10.1109/DSN.2017.63","url":null,"abstract":"Domain Name System (DNS) is a fundamental element of the Internet providing lookup services for end users as well as for a multitude of applications, systems and security mechanisms that depend on DNS, such as antispam defences, routing security, firewalls, certificates and more. Caches constitute a critical component of DNS, allowing to improve efficiency and reduce latency and traffic in the Internet. Understanding the behaviour, configurations and topologies of caches in the DNS platforms in the Internet is important for efficiency and security of Internet users and services. In this work we present methodologies for efficiently discovering and enumerating the caches of the DNS resolution platforms in the Internet. We apply our techniques and methodologies for studying caches in popular DNS resolution platforms in the Internet. Our study includes networks of major ISPs, enterprises and professionally managed open DNS resolvers. The results of our Internet measurements shed light on architectures and configurations of the caches in DNS resolution platforms.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Fast Atomic Multicast 快速原子组播
Paulo R. Coelho, Nicolas Schiper, F. Pedone
Atomic multicast is a communication building block of scalable and highly available applications. With atomic multicast, messages can be ordered and reliably propagated to one or more groups of server processes. Because each message can be multicast to a different set of destinations, distributed message ordering is challenging. Some atomic multicast protocols address this challenge by ordering all messages using a fixed group of processes, regardless of the destination of the messages. To be efficient, however, an atomic multicast protocol must be genuine: only the message sender and destination groups should communicate to order a message. In this paper, we present FastCast, a genuine atomic multicast algorithm that offers unprecedented low time complexity, measured in communication delays. FastCast can order messages addressed to multiple groups in four communication delays, messages addressed to a single group take three communication delays. In addition to proposing a novel atomic multicast protocol, we extensively assess its performance experimentally.
原子多播是可伸缩和高可用性应用程序的通信构建块。通过原子多播,可以对消息进行排序并可靠地传播到一组或多组服务器进程。因为每条消息都可以多播到一组不同的目的地,所以分布式消息排序很有挑战性。一些原子多播协议通过使用一组固定的进程对所有消息进行排序来解决这个问题,而不管消息的目的地是什么。然而,为了提高效率,原子多播协议必须是真实的:只有消息发送方和目标组应该通信以订购消息。在本文中,我们提出了FastCast,一个真正的原子组播算法,它提供了前所未有的低时间复杂度,以通信延迟来衡量。FastCast可以在四个通信延迟中订购发送给多个组的消息,发送给单个组的消息需要三个通信延迟。除了提出一种新的原子组播协议外,我们还对其性能进行了广泛的实验评估。
{"title":"Fast Atomic Multicast","authors":"Paulo R. Coelho, Nicolas Schiper, F. Pedone","doi":"10.1109/DSN.2017.15","DOIUrl":"https://doi.org/10.1109/DSN.2017.15","url":null,"abstract":"Atomic multicast is a communication building block of scalable and highly available applications. With atomic multicast, messages can be ordered and reliably propagated to one or more groups of server processes. Because each message can be multicast to a different set of destinations, distributed message ordering is challenging. Some atomic multicast protocols address this challenge by ordering all messages using a fixed group of processes, regardless of the destination of the messages. To be efficient, however, an atomic multicast protocol must be genuine: only the message sender and destination groups should communicate to order a message. In this paper, we present FastCast, a genuine atomic multicast algorithm that offers unprecedented low time complexity, measured in communication delays. FastCast can order messages addressed to multiple groups in four communication delays, messages addressed to a single group take three communication delays. In addition to proposing a novel atomic multicast protocol, we extensively assess its performance experimentally.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121293055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1