首页 > 最新文献

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Towards Secure and Verifiable Database-Driven Spectrum Sharing 面向安全、可验证的数据库驱动频谱共享
Zhili Chen, Lin Chen, Hong Zhong
Database-driven spectrum access is regarded as an effective spectrum redistribution mechanism. However, dialoguing with the spectrum database requires both primary and secondary users to reveal their sensitive data to the spectrum database manager (SDM), leading to serious privacy concerns. In this paper, we show that the SDM can perform database operations (both updates and queries) without knowing any information about the users' sensitive inputs and the database contents, by combining garbled circuits and secret sharing. Our design uses data-oblivious sorting networks to leverage parallelism of query operations, yielding an efficient query algorithm. We further combine secure computations with authentication techniques to get a verification mechanism for correctness checking. As far as we know, our proposal is the first secure and verifiable database-driven spectrum sharing scheme protecting both primary users' (PUs') and secondary users' (SUs') privacies. Finally, we fully implement our system, and demonstrate that even on commodity PC, our implementation suffers mild performance overhead.
数据库驱动的频谱接入被认为是一种有效的频谱再分配机制。然而,与频谱数据库对话需要主用户和辅助用户向频谱数据库管理器(SDM)透露他们的敏感数据,这导致了严重的隐私问题。在本文中,我们证明了SDM可以在不知道用户敏感输入和数据库内容的任何信息的情况下执行数据库操作(包括更新和查询),通过结合乱码电路和秘密共享。我们的设计使用数据无关排序网络来利用查询操作的并行性,从而产生高效的查询算法。我们进一步将安全计算与身份验证技术结合起来,以获得用于正确性检查的验证机制。据我们所知,我们的提议是第一个安全且可验证的数据库驱动的频谱共享方案,可以保护主用户(pu)和副用户(su)的隐私。最后,我们完全实现了我们的系统,并证明即使在商用PC上,我们的实现也会遭受轻微的性能开销。
{"title":"Towards Secure and Verifiable Database-Driven Spectrum Sharing","authors":"Zhili Chen, Lin Chen, Hong Zhong","doi":"10.1109/DSN.2017.17","DOIUrl":"https://doi.org/10.1109/DSN.2017.17","url":null,"abstract":"Database-driven spectrum access is regarded as an effective spectrum redistribution mechanism. However, dialoguing with the spectrum database requires both primary and secondary users to reveal their sensitive data to the spectrum database manager (SDM), leading to serious privacy concerns. In this paper, we show that the SDM can perform database operations (both updates and queries) without knowing any information about the users' sensitive inputs and the database contents, by combining garbled circuits and secret sharing. Our design uses data-oblivious sorting networks to leverage parallelism of query operations, yielding an efficient query algorithm. We further combine secure computations with authentication techniques to get a verification mechanism for correctness checking. As far as we know, our proposal is the first secure and verifiable database-driven spectrum sharing scheme protecting both primary users' (PUs') and secondary users' (SUs') privacies. Finally, we fully implement our system, and demonstrate that even on commodity PC, our implementation suffers mild performance overhead.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128139414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Load-Optimal Local Fast Rerouting for Resilient Networks 弹性网络的负载最优本地快速重路由
Y. Pignolet, S. Schmid, Gilles Trédan
Reliable and highly available computer networks must implement resilient fast rerouting mechanisms: upon a link or node failure, an alternative route is determined quickly, without involving the network control plane. Designing such fast failover mechanisms capable of dealing with multiple concurrent failures however is challenging, as failover rules need to be installed proactively, i.e., ahead of time, without knowledge of the actual failures happening at runtime. Indeed, only little is known today about the design of resilient routing algorithms. This paper presents a deterministic local failover mechanism which we prove to result in a minimum network load for a wide range of communication patterns, solving an open problem. Our mechanism relies on the key insight that resilient routing essentially constitutes a distributed algorithm without coordination. Accordingly, we build upon the theory of combinatorial designs and develop a novel deterministic failover mechanism based on symmetric block design theory which tolerates a maximal number of Ω(n) link failures in an n-node network and in the worst-case, while always ensuring routing connectivity. In particular, we show that at least Ω(ϕ2) link failures are needed to generate a maximum link load of at least ϕ, which matches an existing bound on the number of link failures needed for an optimal failover scheme. We complement our formal analysis with simulations, showing that our approach outperforms prior schemes not only in the worst-case.
可靠和高可用性的计算机网络必须实现弹性快速重路由机制:当链路或节点故障时,快速确定替代路由,而不涉及网络控制平面。然而,设计这种能够处理多个并发故障的快速故障转移机制是具有挑战性的,因为需要主动安装故障转移规则,即提前安装,而不需要了解运行时发生的实际故障。事实上,目前对弹性路由算法的设计知之甚少。本文提出了一种确定性的本地故障转移机制,并证明该机制可以在各种通信模式下产生最小的网络负载,从而解决了一个开放性问题。我们的机制依赖于一个关键的洞察力,即弹性路由本质上构成了一个没有协调的分布式算法。因此,我们在组合设计理论的基础上,开发了一种基于对称块设计理论的新型确定性故障转移机制,该机制在n节点网络和最坏情况下允许最大数量的Ω(n)链路故障,同时始终确保路由连通性。特别是,我们表明至少Ω(ϕ2)链路故障需要产生至少φ的最大链路负载,这与最佳故障转移方案所需的链路故障数量的现有界限相匹配。我们用模拟来补充我们的形式分析,表明我们的方法不仅在最坏情况下优于先前的方案。
{"title":"Load-Optimal Local Fast Rerouting for Resilient Networks","authors":"Y. Pignolet, S. Schmid, Gilles Trédan","doi":"10.1109/DSN.2017.43","DOIUrl":"https://doi.org/10.1109/DSN.2017.43","url":null,"abstract":"Reliable and highly available computer networks must implement resilient fast rerouting mechanisms: upon a link or node failure, an alternative route is determined quickly, without involving the network control plane. Designing such fast failover mechanisms capable of dealing with multiple concurrent failures however is challenging, as failover rules need to be installed proactively, i.e., ahead of time, without knowledge of the actual failures happening at runtime. Indeed, only little is known today about the design of resilient routing algorithms. This paper presents a deterministic local failover mechanism which we prove to result in a minimum network load for a wide range of communication patterns, solving an open problem. Our mechanism relies on the key insight that resilient routing essentially constitutes a distributed algorithm without coordination. Accordingly, we build upon the theory of combinatorial designs and develop a novel deterministic failover mechanism based on symmetric block design theory which tolerates a maximal number of Ω(n) link failures in an n-node network and in the worst-case, while always ensuring routing connectivity. In particular, we show that at least Ω(ϕ2) link failures are needed to generate a maximum link load of at least ϕ, which matches an existing bound on the number of link failures needed for an optimal failover scheme. We complement our formal analysis with simulations, showing that our approach outperforms prior schemes not only in the worst-case.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Zipr: Efficient Static Binary Rewriting for Security Zipr:高效的静态二进制重写安全
William H. Hawkins, Jason Hiser, M. Co, A. Nguyen-Tuong, J. Davidson
To quickly patch security vulnerabilities there has been keen interest in securing binaries in situ. Unfortunately, the state of the art in static binary rewriting does not allow the transformed program to be both space and time efficient. A primary limitation is that leading static rewriters require that the original copy of the code remains in the transformed binary, thereby incurring file size overhead of at least 100%. This paper presents Zipr, a static binary rewriter that removes this limitation and enables both space and time efficient transformation of arbitrary binaries. We describe results from applying Zipr in the DARPA Cyber Grand Challenge (CGC), the first fully automated cyber-hacking contest. The CGC rules penalized competitors for producing a patched binary whose on-disk size was 20% larger than the original, whose CPU utilization was 5% more than the original, and whose memory use was 5% more than the original. Zipr's efficiency enabled our automated system, Xandra, to apply both code diversity and control flow integrity security techniques to secure challenge binaries provided by DARPA, resulting in Xandra having the best security score in the competition, remaining within the required space and time performance envelope, and winning a $1M cash prize.
为了快速修补安全漏洞,人们对原位保护二进制文件非常感兴趣。不幸的是,静态二进制重写技术的现状不允许转换后的程序同时具有空间和时间效率。一个主要的限制是,主要的静态重写器要求代码的原始副本保留在转换后的二进制文件中,从而导致至少100%的文件大小开销。本文介绍了一个静态二进制重写器Zipr,它消除了这一限制,并实现了任意二进制文件的空间和时间有效转换。我们描述了在DARPA网络大挑战(CGC)中应用Zipr的结果,CGC是第一个全自动网络黑客竞赛。CGC规则对产生补丁二进制文件的竞争者进行处罚,该补丁二进制文件的磁盘大小比原始文件大20%,CPU利用率比原始文件高5%,内存使用比原始文件高5%。Zipr的效率使我们的自动化系统Xandra能够应用代码多样性和控制流完整性安全技术来保护DARPA提供的挑战二进制文件,从而使Xandra在竞赛中获得最佳安全分数,保持在所需的空间和时间性能范围内,并赢得了100万美元的现金奖励。
{"title":"Zipr: Efficient Static Binary Rewriting for Security","authors":"William H. Hawkins, Jason Hiser, M. Co, A. Nguyen-Tuong, J. Davidson","doi":"10.1109/DSN.2017.27","DOIUrl":"https://doi.org/10.1109/DSN.2017.27","url":null,"abstract":"To quickly patch security vulnerabilities there has been keen interest in securing binaries in situ. Unfortunately, the state of the art in static binary rewriting does not allow the transformed program to be both space and time efficient. A primary limitation is that leading static rewriters require that the original copy of the code remains in the transformed binary, thereby incurring file size overhead of at least 100%. This paper presents Zipr, a static binary rewriter that removes this limitation and enables both space and time efficient transformation of arbitrary binaries. We describe results from applying Zipr in the DARPA Cyber Grand Challenge (CGC), the first fully automated cyber-hacking contest. The CGC rules penalized competitors for producing a patched binary whose on-disk size was 20% larger than the original, whose CPU utilization was 5% more than the original, and whose memory use was 5% more than the original. Zipr's efficiency enabled our automated system, Xandra, to apply both code diversity and control flow integrity security techniques to secure challenge binaries provided by DARPA, resulting in Xandra having the best security score in the competition, remaining within the required space and time performance envelope, and winning a $1M cash prize.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128569525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles 规则:半自动化车辆流中攻击者引起的交通流不稳定性
D. D. Dunn, S. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li
We show that a stream of automated vehicles traveling along the highway can be destabilized to catastrophic effect through modification of the control laws of individual vehicles. Specifically, one active attacker who introduces errors, in addition to one or many passive attackers who amplify the error, may, by the modification of a single parameter, induce oscillatory traffic jams that cause delay, driver discomfort, excess energy expenditure, and increased risk of accidents that could result in serious injury or death. We determine the conditions under which an attacker(s) is able to violate the primary design criterion of automated vehicle streams, known as string stability, to guarantee system instability. Furthermore, we prove that once the stream has been destabilized it will continually deviate from the desired state, even in the absence of additional input to the system—i.e. the jammed condition will self-perpetuate. Through a comparison with a behavioral human driver model, this work demonstrates that automated vehicle systems are more vulnerable to disruption than their non-automated counterparts. The postulated attack is demonstrated on a scaled system and identification of attackers is discussed.
我们表明,通过修改单个车辆的控制律,可以使沿高速公路行驶的自动车辆流不稳定并产生灾难性影响。具体来说,一个引入错误的主动攻击者,加上一个或多个放大错误的被动攻击者,可能通过修改单个参数,引起振荡性交通堵塞,导致延误、驾驶员不适、能量消耗过剩,并增加可能导致严重伤害或死亡的事故风险。我们确定了攻击者能够违反自动车辆流的主要设计标准的条件,即字符串稳定性,以保证系统不稳定。此外,我们证明,一旦流不稳定,即使在系统没有额外输入的情况下,它也会不断偏离期望状态。堵塞状态将自我延续。通过与人类驾驶员行为模型的比较,这项工作表明,自动车辆系统比非自动车辆系统更容易受到干扰。在一个规模系统上证明了假设的攻击,并讨论了攻击者的识别问题。
{"title":"Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles","authors":"D. D. Dunn, S. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li","doi":"10.1109/DSN.2017.61","DOIUrl":"https://doi.org/10.1109/DSN.2017.61","url":null,"abstract":"We show that a stream of automated vehicles traveling along the highway can be destabilized to catastrophic effect through modification of the control laws of individual vehicles. Specifically, one active attacker who introduces errors, in addition to one or many passive attackers who amplify the error, may, by the modification of a single parameter, induce oscillatory traffic jams that cause delay, driver discomfort, excess energy expenditure, and increased risk of accidents that could result in serious injury or death. We determine the conditions under which an attacker(s) is able to violate the primary design criterion of automated vehicle streams, known as string stability, to guarantee system instability. Furthermore, we prove that once the stream has been destabilized it will continually deviate from the desired state, even in the absence of additional input to the system—i.e. the jammed condition will self-perpetuate. Through a comparison with a behavioral human driver model, this work demonstrates that automated vehicle systems are more vulnerable to disruption than their non-automated counterparts. The postulated attack is demonstrated on a scaled system and identification of attackers is discussed.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs 分析有状态协议实现的操作行为以检测语义错误
Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, C. Nita-Rotaru, Ninghui Li
Network protocol implementations must comply with their specifications that include properties describing the correct operational behavior of the protocol in response to different temporal orderings of network events. Due to inconsistent interpretations of the specification, developers can unknowingly introduce semantic bugs, which cause the implementations to violate the respective properties. Detecting such bugs in stateful protocols becomes significantly difficult as their operations depend on their internal state machines and the complex interactions between the protocol logic. In this paper, we present an automated tool to help developers analyze their protocol implementations and detect semantic bugs violating the temporal properties of the protocols. Given an implementation, our tool (1) extracts the implemented finite state machine (FSM) of the protocol from the source code by symbolically exploring the code and (2) determines whether the extracted FSM violates given temporal properties by using an off-the-shelf model checker. We demonstrated the efficacy of our tool by applying it on 6 protocol implementations. We detected 11 semantic bugs (2 with security implications) when we analyzed these implementations against properties obtained from their publicly available specifications.
网络协议实现必须遵守其规范,这些规范包括描述协议的正确操作行为的属性,以响应网络事件的不同时间顺序。由于对规范的解释不一致,开发人员可能在不知不觉中引入语义错误,从而导致实现违反各自的属性。检测有状态协议中的此类错误变得非常困难,因为它们的操作依赖于它们的内部状态机和协议逻辑之间的复杂交互。在本文中,我们提出了一个自动化的工具来帮助开发人员分析他们的协议实现,并检测违反协议时间属性的语义错误。给定一个实现,我们的工具(1)通过象征性地探索代码从源代码中提取协议的已实现有限状态机(FSM),(2)通过使用现成的模型检查器确定提取的FSM是否违反给定的时间属性。我们通过在6个协议实现上应用我们的工具来证明它的有效性。当我们根据从公开可用规范中获得的属性分析这些实现时,我们检测到11个语义错误(其中2个带有安全隐患)。
{"title":"Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs","authors":"Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, C. Nita-Rotaru, Ninghui Li","doi":"10.1109/DSN.2017.36","DOIUrl":"https://doi.org/10.1109/DSN.2017.36","url":null,"abstract":"Network protocol implementations must comply with their specifications that include properties describing the correct operational behavior of the protocol in response to different temporal orderings of network events. Due to inconsistent interpretations of the specification, developers can unknowingly introduce semantic bugs, which cause the implementations to violate the respective properties. Detecting such bugs in stateful protocols becomes significantly difficult as their operations depend on their internal state machines and the complex interactions between the protocol logic. In this paper, we present an automated tool to help developers analyze their protocol implementations and detect semantic bugs violating the temporal properties of the protocols. Given an implementation, our tool (1) extracts the implemented finite state machine (FSM) of the protocol from the source code by symbolically exploring the code and (2) determines whether the extracted FSM violates given temporal properties by using an off-the-shelf model checker. We demonstrated the efficacy of our tool by applying it on 6 protocol implementations. We detected 11 semantic bugs (2 with security implications) when we analyzed these implementations against properties obtained from their publicly available specifications.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123961934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Secure Causal Atomic Broadcast, Revisited 安全因果原子广播,重访
Sisi Duan, M. Reiter, Haibin Zhang
We revisit the problem of preserving causality in Byzantine fault-tolerant (BFT) atomic broadcast protocols, a requirement first proposed by Reiter and Birman (TOPLAS 1994). While over the past three decades, this requirement has been met through the deployment of expensive public-key threshold cryptosystems, we propose three novel, secure causal BFT protocols without using public-key cryptography. We implement and evaluate these protocols, showing that they significantly outperform existing constructions that use threshold cryptosystems.
我们重新审视了拜占庭容错(BFT)原子广播协议中保留因果关系的问题,这是Reiter和Birman (TOPLAS 1994)首先提出的要求。虽然在过去的三十年中,这一要求已经通过部署昂贵的公钥阈值密码系统来满足,但我们提出了三种新的、安全的因果BFT协议,而不使用公钥加密。我们实现并评估了这些协议,表明它们明显优于使用阈值密码系统的现有结构。
{"title":"Secure Causal Atomic Broadcast, Revisited","authors":"Sisi Duan, M. Reiter, Haibin Zhang","doi":"10.1109/DSN.2017.64","DOIUrl":"https://doi.org/10.1109/DSN.2017.64","url":null,"abstract":"We revisit the problem of preserving causality in Byzantine fault-tolerant (BFT) atomic broadcast protocols, a requirement first proposed by Reiter and Birman (TOPLAS 1994). While over the past three decades, this requirement has been met through the deployment of expensive public-key threshold cryptosystems, we propose three novel, secure causal BFT protocols without using public-key cryptography. We implement and evaluate these protocols, showing that they significantly outperform existing constructions that use threshold cryptosystems.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors 一个比特是(不)足够的:单个和多个比特翻转错误影响的实证研究
B. Sangchoolie, K. Pattabiraman, J. Karlsson
Recent studies have shown that technology and voltage scaling are expected to increase the likelihood that particle-induced soft errors manifest as multiple-bit errors. This raises concerns about the validity of using single bit-flips for assessing the impact of soft errors in fault injection experiments. The goal of this paper is to investigate whether multiple-bit errors could cause a higher percentage of silent data corruptions (SDCs) compared to single-bit errors. Based on 2700 fault injection campaigns with 15 benchmark programs, featuring a total of 27 million experiments, our results show that single-bit errors in most cases yields a higher percentage of SDCs compared to multiple-bit errors. However, in 8% of the campaigns we observed a higher percentage of SDCs for multiple-bit errors. For most of these campaigns, the highest percentage of SDCs was obtained by flipping at most 3 bits. Moreover, we propose three ways of pruning the error space based on the results.
最近的研究表明,技术和电压缩放有望增加粒子引起的软错误表现为多比特错误的可能性。这引起了人们对在故障注入实验中使用单比特翻转来评估软错误影响的有效性的关注。本文的目的是研究与单比特错误相比,多比特错误是否会导致更高比例的静默数据损坏(sdc)。基于15个基准程序的2700次故障注入活动,总共有2700万次实验,我们的结果表明,在大多数情况下,与多比特错误相比,单比特错误产生的sdc百分比更高。然而,在8%的活动中,我们观察到多比特错误的SDCs百分比更高。对于大多数这些活动,最高百分比的SDCs是通过最多翻转3位获得的。在此基础上,提出了三种对误差空间进行修剪的方法。
{"title":"One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors","authors":"B. Sangchoolie, K. Pattabiraman, J. Karlsson","doi":"10.1109/DSN.2017.30","DOIUrl":"https://doi.org/10.1109/DSN.2017.30","url":null,"abstract":"Recent studies have shown that technology and voltage scaling are expected to increase the likelihood that particle-induced soft errors manifest as multiple-bit errors. This raises concerns about the validity of using single bit-flips for assessing the impact of soft errors in fault injection experiments. The goal of this paper is to investigate whether multiple-bit errors could cause a higher percentage of silent data corruptions (SDCs) compared to single-bit errors. Based on 2700 fault injection campaigns with 15 benchmark programs, featuring a total of 27 million experiments, our results show that single-bit errors in most cases yields a higher percentage of SDCs compared to multiple-bit errors. However, in 8% of the campaigns we observed a higher percentage of SDCs for multiple-bit errors. For most of these campaigns, the highest percentage of SDCs was obtained by flipping at most 3 bits. Moreover, we propose three ways of pruning the error space based on the results.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126645402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Exploring the Long Tail of (Malicious) Software Downloads 探索(恶意)软件下载的长尾
Babak Rahbarinia, Marco Balduzzi, R. Perdisci
In this paper, we present a large-scale study of global trends in software download events, with an analysis of both benign and malicious downloads, and a categorization of events for which no ground truth is currently available. Our measurement study is based on a unique, real-world dataset collected at Trend Micro containing more than 3 million in-the-wild web-based software download events involving hundreds of thousands of Internet machines, collected over a period of seven months. Somewhat surprisingly, we found that despite our best efforts and the use of multiple sources of ground truth, more than 83% of all downloaded software files remain unknown, i.e. cannot be classified as benign or malicious, even two years after they were first observed. If we consider the number of machines that have downloaded at least one unknown file, we find that more than 69% of the entire machine/user population downloaded one or more unknown software file. Because the accuracy of malware detection systems reported in the academic literature is typically assessed only over software files that can be labeled, our findings raise concerns on their actual effectiveness in large-scale real-world deployments, and on their ability to defend the majority of Internet machines from infection. To better understand what these unknown software files may be, we perform a detailed analysis of their properties. We then explore whether it is possible to extend the labeling of software downloads by building a rule-based system that automatically learns from the available ground truth and can be used to identify many more benign and malicious files with very high confidence. This allows us to greatly expand the number of software files that can be labeled with high confidence, thus providing results that can benefit the evaluation of future malware detection systems.
在本文中,我们对软件下载事件的全球趋势进行了大规模研究,对良性和恶意下载进行了分析,并对目前没有真实情况的事件进行了分类。我们的测量研究是基于趋势科技收集的一个独特的、真实的数据集,其中包含超过300万的基于网络的软件下载事件,涉及数十万台互联网机器,收集时间为7个月。有些令人惊讶的是,我们发现,尽管我们尽了最大的努力,并使用了多种来源的地面真相,但超过83%的下载软件文件仍然未知,即无法归类为良性或恶意,甚至在它们首次被发现两年后。如果我们考虑至少下载了一个未知文件的机器数量,我们发现超过69%的整个机器/用户群体下载了一个或多个未知软件文件。因为在学术文献中报告的恶意软件检测系统的准确性通常只对可以标记的软件文件进行评估,我们的研究结果引起了人们对它们在大规模现实世界部署中的实际有效性的关注,以及它们保护大多数互联网机器免受感染的能力。为了更好地了解这些未知的软件文件可能是什么,我们对它们的属性进行了详细的分析。然后,我们探索是否有可能通过建立一个基于规则的系统来扩展软件下载的标签,该系统可以自动从可用的基础事实中学习,并且可以非常高的置信度用于识别更多的良性和恶意文件。这使我们能够极大地扩展可以高置信度标记的软件文件的数量,从而提供有利于评估未来恶意软件检测系统的结果。
{"title":"Exploring the Long Tail of (Malicious) Software Downloads","authors":"Babak Rahbarinia, Marco Balduzzi, R. Perdisci","doi":"10.1109/DSN.2017.19","DOIUrl":"https://doi.org/10.1109/DSN.2017.19","url":null,"abstract":"In this paper, we present a large-scale study of global trends in software download events, with an analysis of both benign and malicious downloads, and a categorization of events for which no ground truth is currently available. Our measurement study is based on a unique, real-world dataset collected at Trend Micro containing more than 3 million in-the-wild web-based software download events involving hundreds of thousands of Internet machines, collected over a period of seven months. Somewhat surprisingly, we found that despite our best efforts and the use of multiple sources of ground truth, more than 83% of all downloaded software files remain unknown, i.e. cannot be classified as benign or malicious, even two years after they were first observed. If we consider the number of machines that have downloaded at least one unknown file, we find that more than 69% of the entire machine/user population downloaded one or more unknown software file. Because the accuracy of malware detection systems reported in the academic literature is typically assessed only over software files that can be labeled, our findings raise concerns on their actual effectiveness in large-scale real-world deployments, and on their ability to defend the majority of Internet machines from infection. To better understand what these unknown software files may be, we perform a detailed analysis of their properties. We then explore whether it is possible to extend the labeling of software downloads by building a rule-based system that automatically learns from the available ground truth and can be used to identify many more benign and malicious files with very high confidence. This allows us to greatly expand the number of software files that can be labeled with high confidence, thus providing results that can benefit the evaluation of future malware detection systems.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130017308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Concolic Execution on Small-Size Binaries: Challenges and Empirical Study 小型二元期权的协同执行:挑战与实证研究
Hui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu
Concolic execution has achieved great success in many binary analysis tasks. However, it is still not a primary option for industrial usage. A well-known reason is that concolic execution cannot scale up to large-size programs. Many research efforts have focused on improving its scalability. Nonetheless, we find that, even when processing small-size programs, concolic execution suffers a great deal from the accuracy and scalability issues. This paper systematically investigates the challenges that can be introduced even by small-size programs, such as symbolic array and symbolic jump. We further verify that the proposed challenges are non-trivial via real-world experiments with three most popular concolic execution tools: BAP, Triton, and Angr. Among a set of 22 logic bombs we designed, Angr can solve only four cases correctly, while BAP and Triton perform much worse. The results imply that current tools are still primitive for practical industrial usage. We summarize the reasons and release the bombs as open source to facilitate further study.
Concolic执行在许多二进制分析任务中取得了巨大的成功。然而,它仍然不是工业应用的主要选择。一个众所周知的原因是,聚合执行无法扩展到大型程序。许多研究工作都集中在提高其可扩展性上。尽管如此,我们发现,即使在处理小型程序时,concolic执行也会受到准确性和可伸缩性问题的严重影响。本文系统地研究了符号数组和符号跳转等小程序可能带来的挑战。我们通过使用三种最流行的结肠执行工具(BAP、Triton和Angr)的实际实验进一步验证了所提出的挑战并非微不足道。在我们设计的22个逻辑炸弹中,Angr只能正确解决4个案例,而BAP和Triton的表现要差得多。结果表明,目前的工具对于实际工业应用来说仍然是原始的。我们总结了原因,并将炸弹作为开源发布,以方便进一步研究。
{"title":"Concolic Execution on Small-Size Binaries: Challenges and Empirical Study","authors":"Hui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu","doi":"10.1109/DSN.2017.11","DOIUrl":"https://doi.org/10.1109/DSN.2017.11","url":null,"abstract":"Concolic execution has achieved great success in many binary analysis tasks. However, it is still not a primary option for industrial usage. A well-known reason is that concolic execution cannot scale up to large-size programs. Many research efforts have focused on improving its scalability. Nonetheless, we find that, even when processing small-size programs, concolic execution suffers a great deal from the accuracy and scalability issues. This paper systematically investigates the challenges that can be introduced even by small-size programs, such as symbolic array and symbolic jump. We further verify that the proposed challenges are non-trivial via real-world experiments with three most popular concolic execution tools: BAP, Triton, and Angr. Among a set of 22 logic bombs we designed, Angr can solve only four cases correctly, while BAP and Triton perform much worse. The results imply that current tools are still primitive for practical industrial usage. We summarize the reasons and release the bombs as open source to facilitate further study.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122707709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Demonstrating a Tool for Injection Attack Prevention in MySQL 演示MySQL中防止注入攻击的工具
Ibéria Medeiros, Miguel Beatriz, N. Neves, M. Correia
Despite the significant efforts put in building more secure web applications, cases of high impact breaches continue to appear. Vulnerabilities in web applications are often created due to inconsistencies in the way SQL queries are believed to be run and the way they are actually executed by a Database Management System (DBMS). This paper presents a demonstration of SEPTIC, a mechanism that detects and blocks injection attacks inside the DBMS. The demonstration considers a scenario of a non-trivial PHP web application, backed by a MySQL DBMS, which was modified to include SEPTIC. It presents how SEPTIC blocks injection attacks without compromising the application correctness and performance. In addition, SEPTIC is compared to alternative approaches, such as sanitizations carried out with standard functions provided language and a web application firewall.
尽管在构建更安全的web应用程序方面付出了巨大的努力,但高影响的违规事件仍在继续出现。web应用程序中的漏洞通常是由于SQL查询的运行方式与数据库管理系统(DBMS)实际执行方式的不一致而产生的。本文展示了一种检测和阻止DBMS内部注入攻击的机制。该演示考虑了一个重要的PHP web应用程序的场景,该应用程序由MySQL DBMS支持,该应用程序被修改为包含了SEPTIC。它介绍了如何在不影响应用程序正确性和性能的情况下阻止注入攻击。此外,还将与其他方法进行比较,例如使用提供的语言和web应用程序防火墙的标准函数执行的检查。
{"title":"Demonstrating a Tool for Injection Attack Prevention in MySQL","authors":"Ibéria Medeiros, Miguel Beatriz, N. Neves, M. Correia","doi":"10.1109/DSN.2017.38","DOIUrl":"https://doi.org/10.1109/DSN.2017.38","url":null,"abstract":"Despite the significant efforts put in building more secure web applications, cases of high impact breaches continue to appear. Vulnerabilities in web applications are often created due to inconsistencies in the way SQL queries are believed to be run and the way they are actually executed by a Database Management System (DBMS). This paper presents a demonstration of SEPTIC, a mechanism that detects and blocks injection attacks inside the DBMS. The demonstration considers a scenario of a non-trivial PHP web application, backed by a MySQL DBMS, which was modified to include SEPTIC. It presents how SEPTIC blocks injection attacks without compromising the application correctness and performance. In addition, SEPTIC is compared to alternative approaches, such as sanitizations carried out with standard functions provided language and a web application firewall.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1