首页 > 最新文献

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications 测量Android应用程序中的动态代码加载及其安全含义
Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, W. Hong, Ryan D. Riley
Android has provided dynamic code loading (DCL) since API level one. DCL allows an app developer to load additional code at runtime. DCL raises numerous challenges with regards to security and accountability analysis of apps. While previous studies have investigated DCL on Android, in this paper we formulate and answer three critical questions that are missing from previous studies: (1) Where does the loaded code come from (remotely fetched or locally packaged), and who is the responsible entity to invoke its functionality? (2) In what ways is DCL utilized to harden mobile apps, specifically, application obfuscation? (3) What are the security risks and implications that can be found from DCL in off-the-shelf apps? We design and implement DyDroid, a system which uses both dynamic and static analysis to analyze dynamically loaded code. Dynamic analysis is used to automatically exercise apps, capture DCL behavior, and intercept the loaded code. Static analysis is used to investigate malicious behavior and privacy leakage in that dynamically loaded code. We have used DyDroid to analyze over 46K apps with little manual intervention, allowing us to conduct a large-scale measurement to investigate five aspects of DCL, such as source identification, malware detection, vulnerability analysis, obfuscation analysis, and privacy tracking analysis. We have several interesting findings. (1) 27 apps are found to violate the content policy of Google Play by executing code downloaded from remote servers. (2) We determine the distribution, pros/cons, and implications of several common obfuscation methods, including DEX encryption/loading. (3) DCL's stealthiness enables it to be a channel to deploy malware, and we find 87 apps loading malicious binaries which are not detected by existing antivirus tools. (4) We found 14 apps that are vulnerable to code injection attacks due to dynamically loading code which is writable by other apps. (5) DCL is mainly used by third-party SDKs, meaning that app developers may not know what sort of sensitive functionality is injected into their apps.
Android从API级别1开始就提供了动态代码加载(DCL)。DCL允许应用开发者在运行时加载额外的代码。DCL在应用程序的安全性和问责性分析方面提出了许多挑战。虽然以前的研究已经调查了Android上的DCL,但在本文中,我们制定并回答了以前研究中遗漏的三个关键问题:(1)加载的代码来自哪里(远程获取或本地打包),谁是调用其功能的负责实体?(2) DCL以何种方式用于强化移动应用程序,特别是应用程序混淆?(3)现成应用中的DCL存在哪些安全风险和影响?我们设计并实现了DyDroid,这是一个使用动态和静态分析来分析动态加载代码的系统。动态分析用于自动运行应用程序,捕获DCL行为,并拦截加载的代码。静态分析用于调查动态加载代码中的恶意行为和隐私泄露。我们使用DyDroid分析了超过46K个应用程序,几乎没有人工干预,允许我们进行大规模测量,调查DCL的五个方面,如来源识别,恶意软件检测,漏洞分析,混淆分析和隐私跟踪分析。我们有几个有趣的发现。(1) 27个应用程序通过执行从远程服务器下载的代码违反了Google Play的内容政策。(2)我们确定了几种常见混淆方法的分布、优缺点和含义,包括DEX加密/加载。(3) DCL的隐蔽性使其成为部署恶意软件的渠道,我们发现有87个应用程序加载恶意二进制文件,而这些程序未被现有的防病毒工具检测到。(4)我们发现14个应用程序由于动态加载其他应用程序可编写的代码而容易受到代码注入攻击。(5) DCL主要由第三方sdk使用,这意味着应用程序开发人员可能不知道哪些敏感功能被注入到他们的应用程序中。
{"title":"DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications","authors":"Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, W. Hong, Ryan D. Riley","doi":"10.1109/DSN.2017.14","DOIUrl":"https://doi.org/10.1109/DSN.2017.14","url":null,"abstract":"Android has provided dynamic code loading (DCL) since API level one. DCL allows an app developer to load additional code at runtime. DCL raises numerous challenges with regards to security and accountability analysis of apps. While previous studies have investigated DCL on Android, in this paper we formulate and answer three critical questions that are missing from previous studies: (1) Where does the loaded code come from (remotely fetched or locally packaged), and who is the responsible entity to invoke its functionality? (2) In what ways is DCL utilized to harden mobile apps, specifically, application obfuscation? (3) What are the security risks and implications that can be found from DCL in off-the-shelf apps? We design and implement DyDroid, a system which uses both dynamic and static analysis to analyze dynamically loaded code. Dynamic analysis is used to automatically exercise apps, capture DCL behavior, and intercept the loaded code. Static analysis is used to investigate malicious behavior and privacy leakage in that dynamically loaded code. We have used DyDroid to analyze over 46K apps with little manual intervention, allowing us to conduct a large-scale measurement to investigate five aspects of DCL, such as source identification, malware detection, vulnerability analysis, obfuscation analysis, and privacy tracking analysis. We have several interesting findings. (1) 27 apps are found to violate the content policy of Google Play by executing code downloaded from remote servers. (2) We determine the distribution, pros/cons, and implications of several common obfuscation methods, including DEX encryption/loading. (3) DCL's stealthiness enables it to be a channel to deploy malware, and we find 87 apps loading malicious binaries which are not detected by existing antivirus tools. (4) We found 14 apps that are vulnerable to code injection attacks due to dynamically loading code which is writable by other apps. (5) DCL is mainly used by third-party SDKs, meaning that app developers may not know what sort of sensitive functionality is injected into their apps.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense 通过智能电表泄露隐私:基于无功功率的攻击和防御
Jingyao Fan, Qinghua Li, G. Cao
Smart meters can record fine-grained power consumption data and provide such data to the power supplier through realtime communications. Although smart meters can make power management more efficient and fault-tolerant, they also pose bigger threats to user privacy. Data from smart meters contain fine-grained power consumption information of home appliances and thus can be used to infer the ON/OFF states of home appliances. This problem has received some attention in the literature, however, most of them focus on active power based attacks. This paper focuses on reactive power and demonstrates how attackers can exploit reactive power data to infer appliance usage information. Experiments on real residential smart meter data show that our proposed attack can identify the ON/OFF events of home appliance with high accuracy. To protect users against such attacks, a novel defense technique called Reactive Power Obfuscation (RPO) is proposed. RPO can mask the true reactive power demand from the smart meter by using a capacitor to store and provide reactive power in a controlled manner. We evaluate the performance of RPO based on real household power consumption data. Evaluation results show that the ON/OFF events of home appliances can hardly be revealed from reactive power data when RPO is applied.
智能电表可以记录细粒度的功耗数据,并通过实时通信将这些数据提供给电力供应商。虽然智能电表可以使电源管理更高效和容错,但它们也对用户隐私构成了更大的威胁。智能电表的数据包含了细粒度的家电用电信息,可以用来推断家电的开/关状态。这个问题在文献中得到了一些关注,然而,大多数研究都集中在基于有功功率的攻击上。本文的重点是无功功率,并演示了攻击者如何利用无功功率数据来推断设备使用信息。在实际住宅智能电表数据上的实验表明,我们提出的攻击方法能够以较高的准确率识别家电的开关事件。为了保护用户免受此类攻击,提出了一种新的防御技术——无功功率混淆(RPO)。RPO可以通过使用电容器以可控的方式存储和提供无功功率来掩盖智能电表的真实无功功率需求。我们基于真实的家庭用电数据来评估RPO的性能。评估结果表明,应用RPO时,家电产品的开/关事件很难从无功数据中反映出来。
{"title":"Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense","authors":"Jingyao Fan, Qinghua Li, G. Cao","doi":"10.1109/DSN.2017.13","DOIUrl":"https://doi.org/10.1109/DSN.2017.13","url":null,"abstract":"Smart meters can record fine-grained power consumption data and provide such data to the power supplier through realtime communications. Although smart meters can make power management more efficient and fault-tolerant, they also pose bigger threats to user privacy. Data from smart meters contain fine-grained power consumption information of home appliances and thus can be used to infer the ON/OFF states of home appliances. This problem has received some attention in the literature, however, most of them focus on active power based attacks. This paper focuses on reactive power and demonstrates how attackers can exploit reactive power data to infer appliance usage information. Experiments on real residential smart meter data show that our proposed attack can identify the ON/OFF events of home appliance with high accuracy. To protect users against such attacks, a novel defense technique called Reactive Power Obfuscation (RPO) is proposed. RPO can mask the true reactive power demand from the smart meter by using a capacitor to store and provide reactive power in a controlled manner. We evaluate the performance of RPO based on real household power consumption data. Evaluation results show that the ON/OFF events of home appliances can hardly be revealed from reactive power data when RPO is applied.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Agora: A Dependable High-Performance Coordination Service for Multi-cores Agora:一个可靠的高性能多核协调服务
Rainer Schiekofer, J. Behl, T. Distler
Coordination services are essential building blocks of today's data centers as they provide processes of distributed applications with means to reliably exchange data. Consequently, coordination services must deliver high performance to ensure that they do not become a bottleneck for the applications depending on them. Unfortunately, the design of existing services such as ZooKeeper prevents them from scaling with the number of cores on a machine. In this paper, we address this problem with Agora, a high-performance coordination service that is able to both effectively and efficiently utilize multi-core machines. Agora relies on a primary-backup replication architecture that partitions the workload on each server to achieve parallelism while still providing similar consistency guarantees as ZooKeeper. Our evaluation shows that Agora scales with the number of cores and thus can fully utilize the network resources available.
协调服务是当今数据中心必不可少的构建块,因为它们为分布式应用程序的进程提供了可靠交换数据的方法。因此,协调服务必须提供高性能,以确保它们不会成为依赖于它们的应用程序的瓶颈。不幸的是,ZooKeeper等现有服务的设计阻止了它们随着机器上的核心数量而扩展。在本文中,我们用Agora解决了这个问题,Agora是一个高性能的协调服务,能够有效地利用多核机器。Agora依赖于主备份复制架构,该架构在每个服务器上分区工作负载以实现并行性,同时仍然提供与ZooKeeper类似的一致性保证。我们的评估表明,Agora可以随着内核数量的增加而扩展,从而可以充分利用可用的网络资源。
{"title":"Agora: A Dependable High-Performance Coordination Service for Multi-cores","authors":"Rainer Schiekofer, J. Behl, T. Distler","doi":"10.1109/DSN.2017.23","DOIUrl":"https://doi.org/10.1109/DSN.2017.23","url":null,"abstract":"Coordination services are essential building blocks of today's data centers as they provide processes of distributed applications with means to reliably exchange data. Consequently, coordination services must deliver high performance to ensure that they do not become a bottleneck for the applications depending on them. Unfortunately, the design of existing services such as ZooKeeper prevents them from scaling with the number of cores on a machine. In this paper, we address this problem with Agora, a high-performance coordination service that is able to both effectively and efficiently utilize multi-core machines. Agora relies on a primary-backup replication architecture that partitions the workload on each server to achieve parallelism while still providing similar consistency guarantees as ZooKeeper. Our evaluation shows that Agora scales with the number of cores and thus can fully utilize the network resources available.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dependability-Aware Design Space Exploration for Optimal Synthesis Parameters Tuning 基于可靠性感知的最优综合参数整定设计空间探索
I. Tuzov, D. Andrés, J. Ruiz
This paper studies the impact of logical synthesizers parameters on the performance, power-consumption, area (PPA) and dependability of HW implementations. Deducing optimal synthesis-parameter configurations attending to specific goals is challenging even for simple HW models. The proposal relies on fractional factorial design of experiments to minimize simulation-based fault-injection time. The set of synthesis parameters with an statistically significant impact on PPA and dependability goals is then deduced and regression models are generated to estimate such impact for any synthesis-parameter configuration. Optimal configurations are finally selected attending to specific implementation goals. The whole methodology is automated and applied onto the Xilinx XST synthesizer working on a simplex and TMR version of an enhanced Intel 8051 microcontroller model, but it can be potentially applied to any synthesizer and any HDL-based model. Results show that non-negligible benefits in terms of PPA and dependability can be obtained by simply tuning synthesizer parameters in a proper way.
本文研究了逻辑合成器参数对硬件实现的性能、功耗、面积(PPA)和可靠性的影响。即使对于简单的HW模型,也很难推导出符合特定目标的最佳综合参数配置。该建议依赖于实验的分数因子设计,以最大限度地减少基于仿真的故障注入时间。然后推导出对PPA和可靠性目标具有统计显著影响的合成参数集,并生成回归模型来估计任何合成参数配置的这种影响。最后根据具体的实现目标选择最优配置。整个方法是自动化的,并应用于Xilinx XST合成器上,该合成器工作在增强的Intel 8051微控制器模型的simplex和TMR版本上,但它可以潜在地应用于任何合成器和任何基于hdl的模型。结果表明,通过适当调整合成器参数,可以获得不可忽视的PPA和可靠性效益。
{"title":"Dependability-Aware Design Space Exploration for Optimal Synthesis Parameters Tuning","authors":"I. Tuzov, D. Andrés, J. Ruiz","doi":"10.1109/DSN.2017.18","DOIUrl":"https://doi.org/10.1109/DSN.2017.18","url":null,"abstract":"This paper studies the impact of logical synthesizers parameters on the performance, power-consumption, area (PPA) and dependability of HW implementations. Deducing optimal synthesis-parameter configurations attending to specific goals is challenging even for simple HW models. The proposal relies on fractional factorial design of experiments to minimize simulation-based fault-injection time. The set of synthesis parameters with an statistically significant impact on PPA and dependability goals is then deduced and regression models are generated to estimate such impact for any synthesis-parameter configuration. Optimal configurations are finally selected attending to specific implementation goals. The whole methodology is automated and applied onto the Xilinx XST synthesizer working on a simplex and TMR version of an enhanced Intel 8051 microcontroller model, but it can be potentially applied to any synthesizer and any HDL-based model. Results show that non-negligible benefits in terms of PPA and dependability can be obtained by simply tuning synthesizer parameters in a proper way.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132550898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ATTAIN: An Attack Injection Framework for Software-Defined Networking 软件定义网络的攻击注入框架
Benjamin E. Ujcich, Uttam Thakore, W. Sanders
Software-defined networking (SDN) has recently attracted interest as a way to provide cyber resiliency because of its programmable and logically centralized nature. However, the security of the SDN architecture itself against malicious attacks is not well understood and must be ensured in order to provide cyber resiliency to systems that use SDNs. In this paper, we present ATTAIN, an attack injection framework for OpenFlow-based SDN architectures. First, we define an attack model that relates system components to an attacker's capability to influence control plane behavior. Second, we define an attack language for writing control plane attacks that can be used to evaluate SDN implementations. Third, we describe an attack injector architecture that actuates attacks in networks. Finally, we evaluate our framework with an enterprise network case study by writing and running attacks with popular SDN controllers.
软件定义网络(SDN)由于其可编程和逻辑集中的特性,最近作为提供网络弹性的一种方式引起了人们的兴趣。然而,SDN架构本身对恶意攻击的安全性还没有得到很好的理解,必须确保为使用SDN的系统提供网络弹性。在本文中,我们提出了一个基于openflow的SDN架构的攻击注入框架ATTAIN。首先,我们定义了一个攻击模型,该模型将系统组件与攻击者影响控制平面行为的能力联系起来。其次,我们定义了一种攻击语言,用于编写可用于评估SDN实现的控制平面攻击。第三,我们描述了在网络中启动攻击的攻击注入器架构。最后,我们通过使用流行的SDN控制器编写和运行攻击,通过企业网络案例研究来评估我们的框架。
{"title":"ATTAIN: An Attack Injection Framework for Software-Defined Networking","authors":"Benjamin E. Ujcich, Uttam Thakore, W. Sanders","doi":"10.1109/DSN.2017.59","DOIUrl":"https://doi.org/10.1109/DSN.2017.59","url":null,"abstract":"Software-defined networking (SDN) has recently attracted interest as a way to provide cyber resiliency because of its programmable and logically centralized nature. However, the security of the SDN architecture itself against malicious attacks is not well understood and must be ensured in order to provide cyber resiliency to systems that use SDNs. In this paper, we present ATTAIN, an attack injection framework for OpenFlow-based SDN architectures. First, we define an attack model that relates system components to an attacker's capability to influence control plane behavior. Second, we define an attack language for writing control plane attacks that can be used to evaluate SDN implementations. Third, we describe an attack injector architecture that actuates attacks in networks. Finally, we evaluate our framework with an enterprise network case study by writing and running attacks with popular SDN controllers.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125089150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Random Walk Based Fake Account Detection in Online Social Networks 基于随机漫步的在线社交网络虚假账户检测
Jinyuan Jia, Binghui Wang, N. Gong
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an attacker maintains massive fake accounts (also called Sybils) and uses them to perform various malicious activities. Therefore, Sybil detection is a fundamental security research problem in online social networks. Random walk based methods, which leverage the structure of an online social network to distribute reputation scores for users, have been demonstrated to be promising in certain real-world online social networks. In particular, random walk based methods have three desired features: they can have theoretically guaranteed performance for online social networks that have the fast-mixing property, they are accurate when the social network has strong homophily property, and they can be scalable to large-scale online social networks. However, existing random walk based methods suffer from several key limitations: 1) they can only leverage either labeled benign users or labeled Sybils, but not both, 2) they have limited detection accuracy for weak-homophily social networks, and 3) they are not robust to label noise in the training dataset. In this work, we propose a new random walk based Sybil detection method called SybilWalk. SybilWalk addresses the limitations of existing random walk based methods while maintaining their desired features. We perform both theoretical and empirical evaluations to compare SybilWalk with previous random walk based methods. Theoretically, for online social networks with the fast-mixing property, SybilWalk has a tighter asymptotical bound on the number of Sybils that are falsely accepted into the social network than all existing random walk based methods. Empirically, we compare SybilWalk with previous random walk based methods using both social networks with synthesized Sybils and a large-scale Twitter dataset with real Sybils. Our empirical results demonstrate that 1) SybilWalk is substantially more accurate than existing random walk based methods for weakhomophily social networks, 2) SybilWalk is substantially more robust to label noise than existing random walk based methods, and 3) SybilWalk is as scalable as the most efficient existing random walk based methods. In particular, on the Twitter dataset, SybilWalk achieves a false positive rate of 1.3% and a false negative rate of 17.3%.
众所周知,在线社交网络很容易受到所谓的Sybil攻击,攻击者会维护大量虚假账户(也称为Sybil),并利用这些账户进行各种恶意活动。因此,Sybil检测是在线社交网络安全研究的一个基本问题。基于随机漫步的方法利用在线社交网络的结构为用户分配声誉分数,已被证明在某些现实世界的在线社交网络中很有前途。特别是,基于随机漫步的方法具有三个理想的特征:对于具有快速混合特性的在线社交网络具有理论上保证的性能;对于具有强同质性的社交网络具有准确的性能;对于大规模的在线社交网络具有可扩展性。然而,现有的基于随机漫步的方法存在几个关键的局限性:1)它们只能利用标记的良性用户或标记的Sybils,但不能两者都利用;2)它们对弱同态社交网络的检测精度有限;3)它们对训练数据集中的标记噪声不具有鲁棒性。在这项工作中,我们提出了一种新的基于随机行走的Sybil检测方法,称为SybilWalk。SybilWalk解决了现有基于随机行走方法的局限性,同时保持了它们所需的功能。我们进行了理论和实证评估,将SybilWalk与以前基于随机行走的方法进行比较。理论上,对于具有快速混合特性的在线社交网络,SybilWalk比所有现有的基于随机行走的方法对被错误地接受到社交网络中的SybilWalk的数量有更严格的渐近界。在经验上,我们将SybilWalk与之前基于随机行走的方法进行了比较,使用了具有合成Sybils的社交网络和具有真实Sybils的大规模Twitter数据集。我们的实证结果表明:1)对于弱同态社交网络,SybilWalk比现有的基于随机行走的方法准确得多;2)SybilWalk对标记噪声的鲁棒性比现有的基于随机行走的方法强;3)SybilWalk与现有最有效的基于随机行走的方法一样具有可扩展性。特别是,在Twitter数据集上,SybilWalk的假阳性率为1.3%,假阴性率为17.3%。
{"title":"Random Walk Based Fake Account Detection in Online Social Networks","authors":"Jinyuan Jia, Binghui Wang, N. Gong","doi":"10.1109/DSN.2017.55","DOIUrl":"https://doi.org/10.1109/DSN.2017.55","url":null,"abstract":"Online social networks are known to be vulnerable to the so-called Sybil attack, in which an attacker maintains massive fake accounts (also called Sybils) and uses them to perform various malicious activities. Therefore, Sybil detection is a fundamental security research problem in online social networks. Random walk based methods, which leverage the structure of an online social network to distribute reputation scores for users, have been demonstrated to be promising in certain real-world online social networks. In particular, random walk based methods have three desired features: they can have theoretically guaranteed performance for online social networks that have the fast-mixing property, they are accurate when the social network has strong homophily property, and they can be scalable to large-scale online social networks. However, existing random walk based methods suffer from several key limitations: 1) they can only leverage either labeled benign users or labeled Sybils, but not both, 2) they have limited detection accuracy for weak-homophily social networks, and 3) they are not robust to label noise in the training dataset. In this work, we propose a new random walk based Sybil detection method called SybilWalk. SybilWalk addresses the limitations of existing random walk based methods while maintaining their desired features. We perform both theoretical and empirical evaluations to compare SybilWalk with previous random walk based methods. Theoretically, for online social networks with the fast-mixing property, SybilWalk has a tighter asymptotical bound on the number of Sybils that are falsely accepted into the social network than all existing random walk based methods. Empirically, we compare SybilWalk with previous random walk based methods using both social networks with synthesized Sybils and a large-scale Twitter dataset with real Sybils. Our empirical results demonstrate that 1) SybilWalk is substantially more accurate than existing random walk based methods for weakhomophily social networks, 2) SybilWalk is substantially more robust to label noise than existing random walk based methods, and 3) SybilWalk is as scalable as the most efficient existing random walk based methods. In particular, on the Twitter dataset, SybilWalk achieves a false positive rate of 1.3% and a false negative rate of 17.3%.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution StatSym:通过统计引导符号执行发现脆弱路径
Fan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani
Identifying vulnerabilities in software systems is crucial to minimizing the damages that result from malicious exploits and software failures. This often requires proper identification of vulnerable execution paths that contain program vulnerabilities or bugs. However, with rapid rise in software complexity, it has become notoriously difficult to identify such vulnerable paths through exhaustively searching the entire program execution space. In this paper, we propose StatSym, a novel, automated Statistics-Guided Symbolic Execution framework that integrates the swiftness of statistical inference and the rigorousness of symbolic execution techniques to achieve precision, agility and scalability in vulnerable program path discovery. Our solution first leverages statistical analysis of program runtime information to construct predicates that are indicative of potential vulnerability in programs. These statistically identified paths, along with the associated predicates, effectively drive a symbolic execution engine to verify the presence of vulnerable paths and reduce their time to solution. We evaluate StatSym on four real-world applications including polymorph, CTree, Grep and thttpd that come from diverse domains. Results show that StatSym is able to assist the symbolic executor, KLEE, in identifying the vulnerable paths for all of the four cases, whereas pure symbolic execution fails in three out of four applications due to memory space overrun.
识别软件系统中的漏洞对于最小化恶意利用和软件故障造成的损害至关重要。这通常需要正确识别包含程序漏洞或错误的易受攻击的执行路径。然而,随着软件复杂性的迅速增加,通过彻底搜索整个程序执行空间来识别这些易受攻击的路径已经变得非常困难。在本文中,我们提出了StatSym,一个新颖的,自动化的统计引导符号执行框架,它集成了统计推断的快速性和符号执行技术的严谨性,以实现脆弱程序路径发现的准确性,敏捷性和可扩展性。我们的解决方案首先利用程序运行时信息的统计分析来构建指示程序中潜在漏洞的谓词。这些统计识别的路径,以及相关的谓词,有效地驱动符号执行引擎来验证易受攻击路径的存在,并减少解决它们的时间。我们在四个实际应用中评估StatSym,包括来自不同领域的polymorph, CTree, Grep和thttpd。结果表明,StatSym能够帮助符号执行器KLEE识别所有四种情况下的易受攻击路径,而纯符号执行在四分之三的应用程序中由于内存空间溢出而失败。
{"title":"StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution","authors":"Fan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani","doi":"10.1109/DSN.2017.57","DOIUrl":"https://doi.org/10.1109/DSN.2017.57","url":null,"abstract":"Identifying vulnerabilities in software systems is crucial to minimizing the damages that result from malicious exploits and software failures. This often requires proper identification of vulnerable execution paths that contain program vulnerabilities or bugs. However, with rapid rise in software complexity, it has become notoriously difficult to identify such vulnerable paths through exhaustively searching the entire program execution space. In this paper, we propose StatSym, a novel, automated Statistics-Guided Symbolic Execution framework that integrates the swiftness of statistical inference and the rigorousness of symbolic execution techniques to achieve precision, agility and scalability in vulnerable program path discovery. Our solution first leverages statistical analysis of program runtime information to construct predicates that are indicative of potential vulnerability in programs. These statistically identified paths, along with the associated predicates, effectively drive a symbolic execution engine to verify the presence of vulnerable paths and reduce their time to solution. We evaluate StatSym on four real-world applications including polymorph, CTree, Grep and thttpd that come from diverse domains. Results show that StatSym is able to assist the symbolic executor, KLEE, in identifying the vulnerable paths for all of the four cases, whereas pure symbolic execution fails in three out of four applications due to memory space overrun.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126106331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
JMake: Dependable Compilation for Kernel Janitors JMake:内核看门人的可靠编译
J. Lawall, Gilles Muller
The Linux kernel is highly configurable, and thus, in principle, any line of code can be included or excluded from the compiled kernel based on configuration operations. Configurability complicates the task of a kernel janitor, who cleans up faults across the code base. A janitor may not be familiar with the configuration options that trigger compilation of a particular code line, leading him to believe that a fix has been compile-checked when this is not the case. We propose JMake, a mutation-based tool for signaling changed lines that are not subjected to the compiler. JMake shows that for most of the 12,000 file-modifying commits between Linux v4.3 and v4.4 the configuration chosen by the kernel allyesconfig option is sufficient, once the janitor chooses the correct architecture. For most commits, this check requires only 30 seconds or less. We then characterize the situations in which changed code is not subjected to compilation in practice.
Linux内核是高度可配置的,因此,原则上,任何一行代码都可以根据配置操作从编译的内核中包括或排除。可配置性使清理整个代码库中的错误的内核管理员的任务变得复杂。管理员可能不熟悉触发特定代码行编译的配置选项,导致他认为已经对修复进行了编译检查,而事实并非如此。我们推荐JMake,这是一个基于突变的工具,用于通知不受编译器影响的更改行。JMake显示,对于Linux v4.3和v4.4之间的12,000个文件修改提交中的大多数,只要管理员选择了正确的体系结构,内核allyesconfig选项选择的配置就足够了。对于大多数提交,此检查只需要30秒或更短的时间。然后,我们描述了在实践中更改的代码不受编译影响的情况。
{"title":"JMake: Dependable Compilation for Kernel Janitors","authors":"J. Lawall, Gilles Muller","doi":"10.1109/DSN.2017.62","DOIUrl":"https://doi.org/10.1109/DSN.2017.62","url":null,"abstract":"The Linux kernel is highly configurable, and thus, in principle, any line of code can be included or excluded from the compiled kernel based on configuration operations. Configurability complicates the task of a kernel janitor, who cleans up faults across the code base. A janitor may not be familiar with the configuration options that trigger compilation of a particular code line, leading him to believe that a fix has been compile-checked when this is not the case. We propose JMake, a mutation-based tool for signaling changed lines that are not subjected to the compiler. JMake shows that for most of the 12,000 file-modifying commits between Linux v4.3 and v4.4 the configuration chosen by the kernel allyesconfig option is sufficient, once the janitor chooses the correct architecture. For most commits, this check requires only 30 seconds or less. We then characterize the situations in which changed code is not subjected to compilation in practice.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deadline-Aware Multipath Communication: An Optimization Problem 截止日期感知多路径通信:一个优化问题
L. Chuat, A. Perrig, Yih-Chun Hu
Multipath communication not only allows improved throughput but can also be used to leverage different path characteristics to best fulfill each application's objective. In particular, certain delay-sensitive applications, such as real-time voice and video communications, can usually withstand packet loss and aim to maximize throughput while keeping latency at a reasonable level. In such a context, one hard problem is to determine along which path the data should be transmitted or retransmitted. In this paper, we formulate this problem as a linear optimization, show bounds on the performance that can be obtained in a multipath paradigm, and show that path diversity is a strong asset for improving network performance. We also discuss how these theoretical limits can be approached in practice and present simulation results.
多路径通信不仅可以提高吞吐量,还可以用来利用不同的路径特性来最好地实现每个应用程序的目标。特别是,某些对延迟敏感的应用程序,如实时语音和视频通信,通常可以承受数据包丢失,并以最大吞吐量为目标,同时将延迟保持在合理水平。在这样的上下文中,一个困难的问题是确定沿着哪个路径传输或重传输数据。在本文中,我们将该问题表述为线性优化,展示了在多路径范式中可以获得的性能界限,并展示了路径多样性是提高网络性能的强大资产。我们还讨论了如何在实践中接近这些理论极限,并给出了仿真结果。
{"title":"Deadline-Aware Multipath Communication: An Optimization Problem","authors":"L. Chuat, A. Perrig, Yih-Chun Hu","doi":"10.1109/DSN.2017.32","DOIUrl":"https://doi.org/10.1109/DSN.2017.32","url":null,"abstract":"Multipath communication not only allows improved throughput but can also be used to leverage different path characteristics to best fulfill each application's objective. In particular, certain delay-sensitive applications, such as real-time voice and video communications, can usually withstand packet loss and aim to maximize throughput while keeping latency at a reasonable level. In such a context, one hard problem is to determine along which path the data should be transmitted or retransmitted. In this paper, we formulate this problem as a linear optimization, show bounds on the performance that can be obtained in a multipath paradigm, and show that path diversity is a strong asset for improving network performance. We also discuss how these theoretical limits can be approached in practice and present simulation results.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries 功能接口分析:COTS二进制文件中功能识别的一种原则性方法
Rui Qiao, R. Sekar
Function recognition is one of the key tasks in binary analysis, instrumentation and reverse engineering. Previous approaches for this problem have relied on matching code patterns commonly observed at the beginning and end of functions. While early efforts relied on compiler idioms and expert-identified patterns, more recent works have systematized the process using machine-learning techniques. In contrast, we develop a novel static analysis based method in this paper. In particular, we combine a low-level technique for enumerating candidate functions with a novel static analysis for determining if these candidates exhibit the properties associated with a function interface. Both control-flow properties (e.g., returning to the location at the stack top at the function entry point) and data-flow properties (e.g., parameter passing via registers and the stack, and the degree of adherence to application-binary interface conventions) are checked. Our approach achieves an F1-score above 99% across a broad range of programs across multiple languages and compilers. More importantly, it achieves a 4x or higher reduction in error rate over best previous results.
函数识别是二进制分析、仪器仪表和逆向工程中的关键任务之一。以前解决这个问题的方法依赖于匹配通常在函数开始和结束时观察到的代码模式。虽然早期的工作依赖于编译器习惯用法和专家识别的模式,但最近的工作已经使用机器学习技术将这一过程系统化。与此相反,本文提出了一种基于静态分析的新方法。特别地,我们将用于枚举候选函数的低级技术与用于确定这些候选函数是否具有与函数接口相关的属性的新颖静态分析相结合。控制流属性(例如,返回到函数入口点堆栈顶部的位置)和数据流属性(例如,通过寄存器和堆栈传递参数,以及遵守应用程序二进制接口约定的程度)都要进行检查。我们的方法在多种语言和编译器的广泛程序中实现了超过99%的f1得分。更重要的是,与以前最好的结果相比,它可以将错误率降低4倍或更高。
{"title":"Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries","authors":"Rui Qiao, R. Sekar","doi":"10.1109/DSN.2017.29","DOIUrl":"https://doi.org/10.1109/DSN.2017.29","url":null,"abstract":"Function recognition is one of the key tasks in binary analysis, instrumentation and reverse engineering. Previous approaches for this problem have relied on matching code patterns commonly observed at the beginning and end of functions. While early efforts relied on compiler idioms and expert-identified patterns, more recent works have systematized the process using machine-learning techniques. In contrast, we develop a novel static analysis based method in this paper. In particular, we combine a low-level technique for enumerating candidate functions with a novel static analysis for determining if these candidates exhibit the properties associated with a function interface. Both control-flow properties (e.g., returning to the location at the stack top at the function entry point) and data-flow properties (e.g., parameter passing via registers and the stack, and the degree of adherence to application-binary interface conventions) are checked. Our approach achieves an F1-score above 99% across a broad range of programs across multiple languages and compilers. More importantly, it achieves a 4x or higher reduction in error rate over best previous results.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116769015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1