首页 > 最新文献

Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security最新文献

英文 中文
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms 移动平台上的确定性Rowhammer攻击
V. V. D. Veen, Y. Fratantonio, Martina Lindorfer, D. Gruss, Clémentine Maurice, G. Vigna, H. Bos, Kaveh Razavi, Cristiano Giuffrida
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects in vulnerable physical memory locations. Moreover, prior work only targets x86 and researchers have openly wondered whether Rowhammer attacks on other architectures, such as ARM, are even possible. We show that deterministic Rowhammer attacks are feasible on commodity mobile platforms and that they cannot be mitigated by current defenses. Rather than assuming special memory management features, our attack, DRAMMER, solely relies on the predictable memory reuse patterns of standard physical memory allocators. We implement DRAMMER on Android/ARM, demonstrating the practicability of our attack, but also discuss a generalization of our approach to other Linux-based platforms. Furthermore, we show that traditional x86-based Rowhammer exploitation techniques no longer work on mobile platforms and address the resulting challenges towards practical mobile Rowhammer attacks. To support our claims, we present the first Rowhammer-based Android root exploit relying on no software vulnerability, and requiring no user permissions. In addition, we present an analysis of several popular smartphones and find that many of them are susceptible to our DRAMMER attack. We conclude by discussing potential mitigation strategies and urging our community to address the concrete threat of faulty DRAM chips in widespread commodity platforms.
最近的研究表明,Rowhammer硬件漏洞可以用来制造强大的攻击并完全颠覆系统。然而,现有的努力要么描述概率(因此不可靠)攻击,要么依赖于特殊(通常不可用)内存管理特性,将受害者对象放置在易受攻击的物理内存位置。此外,先前的工作只针对x86,研究人员公开怀疑Rowhammer攻击其他架构(如ARM)是否可能。我们证明了确定性的Rowhammer攻击在商品移动平台上是可行的,并且它们无法通过当前的防御来缓解。我们的攻击,即DRAMMER,并没有假定有特殊的内存管理特性,而是完全依赖于标准物理内存分配器的可预测的内存重用模式。我们在Android/ARM上实现了DRAMMER,展示了我们攻击的实用性,但也讨论了我们的方法在其他基于linux的平台上的推广。此外,我们表明传统的基于x86的Rowhammer攻击技术不再适用于移动平台,并解决了实际移动Rowhammer攻击所带来的挑战。为了支持我们的说法,我们提出了第一个基于rowhhammer的Android根漏洞,不依赖于软件漏洞,不需要用户权限。此外,我们对几种流行的智能手机进行了分析,发现其中许多都容易受到我们的DRAMMER攻击。最后,我们讨论了潜在的缓解策略,并敦促我们的社区解决广泛商用平台中故障DRAM芯片的具体威胁。
{"title":"Drammer: Deterministic Rowhammer Attacks on Mobile Platforms","authors":"V. V. D. Veen, Y. Fratantonio, Martina Lindorfer, D. Gruss, Clémentine Maurice, G. Vigna, H. Bos, Kaveh Razavi, Cristiano Giuffrida","doi":"10.1145/2976749.2978406","DOIUrl":"https://doi.org/10.1145/2976749.2978406","url":null,"abstract":"Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects in vulnerable physical memory locations. Moreover, prior work only targets x86 and researchers have openly wondered whether Rowhammer attacks on other architectures, such as ARM, are even possible. We show that deterministic Rowhammer attacks are feasible on commodity mobile platforms and that they cannot be mitigated by current defenses. Rather than assuming special memory management features, our attack, DRAMMER, solely relies on the predictable memory reuse patterns of standard physical memory allocators. We implement DRAMMER on Android/ARM, demonstrating the practicability of our attack, but also discuss a generalization of our approach to other Linux-based platforms. Furthermore, we show that traditional x86-based Rowhammer exploitation techniques no longer work on mobile platforms and address the resulting challenges towards practical mobile Rowhammer attacks. To support our claims, we present the first Rowhammer-based Android root exploit relying on no software vulnerability, and requiring no user permissions. In addition, we present an analysis of several popular smartphones and find that many of them are susceptible to our DRAMMER attack. We conclude by discussing potential mitigation strategies and urging our community to address the concrete threat of faulty DRAM chips in widespread commodity platforms.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123132408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 281
Targeted Online Password Guessing: An Underestimated Threat 目标在线密码猜测:一个被低估的威胁
Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang
While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information such as one sister password leaked from her another account and some personally identifiable information (PII). A key challenge for targeted online guessing is to choose the most effective password candidates, while the number of guess attempts allowed by a server's lockout or throttling mechanisms is typically very small. We propose TarGuess, a framework that systematically characterizes typical targeted guessing scenarios with seven sound mathematical models, each of which is based on varied kinds of data available to an attacker. These models allow us to design novel and efficient guessing algorithms. Extensive experiments on 10 large real-world password datasets show the effectiveness of TarGuess. Particularly, TarGuess I~IV capture the four most representative scenarios and within 100 guesses: (1) TarGuess-I outperforms its foremost counterpart by 142% against security-savvy users and by 46% against normal users; (2) TarGuess-II outperforms its foremost counterpart by 169% on security-savvy users and by 72% against normal users; and (3) Both TarGuess-III and IV gain success rates over 73% against normal users and over 32% against security-savvy users. TarGuess-III and IV, for the first time, address the issue of cross-site online guessing when given the victim's one sister password and some PII.
虽然在线/离线密码猜测已经被深入研究,但只有少数研究研究了有针对性的在线猜测,攻击者通过利用受害者的个人信息(例如从她的另一个账户泄露的一个姐妹密码和一些个人身份信息(PII))来猜测特定受害者的服务密码。有针对性的在线猜测的一个关键挑战是选择最有效的候选密码,而服务器锁定或节流机制允许的猜测次数通常非常少。我们提出了TarGuess,这是一个框架,它系统地描述了典型的目标猜测场景,其中有七个健全的数学模型,每个模型都基于攻击者可用的各种数据。这些模型使我们能够设计新颖有效的猜测算法。在10个大型真实世界密码数据集上进行的大量实验表明了TarGuess的有效性。特别是,TarGuess I~IV捕获了四种最具代表性的场景,并在100次猜测内:(1)TarGuess-I在安全精明的用户中比其最重要的对手高出142%,在普通用户中高出46%;(2)在精通安全的用户中,TarGuess-II的表现比最重要的同类产品高出169%,在普通用户中高出72%;(3)针对普通用户,TarGuess-III和targuess - IV的成功率均超过73%,而针对精通安全的用户,成功率均超过32%。TarGuess-III和IV,第一次,解决跨站点在线猜测的问题,当给予受害者的一个姐妹密码和一些PII。
{"title":"Targeted Online Password Guessing: An Underestimated Threat","authors":"Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang","doi":"10.1145/2976749.2978339","DOIUrl":"https://doi.org/10.1145/2976749.2978339","url":null,"abstract":"While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information such as one sister password leaked from her another account and some personally identifiable information (PII). A key challenge for targeted online guessing is to choose the most effective password candidates, while the number of guess attempts allowed by a server's lockout or throttling mechanisms is typically very small. We propose TarGuess, a framework that systematically characterizes typical targeted guessing scenarios with seven sound mathematical models, each of which is based on varied kinds of data available to an attacker. These models allow us to design novel and efficient guessing algorithms. Extensive experiments on 10 large real-world password datasets show the effectiveness of TarGuess. Particularly, TarGuess I~IV capture the four most representative scenarios and within 100 guesses: (1) TarGuess-I outperforms its foremost counterpart by 142% against security-savvy users and by 46% against normal users; (2) TarGuess-II outperforms its foremost counterpart by 169% on security-savvy users and by 72% against normal users; and (3) Both TarGuess-III and IV gain success rates over 73% against normal users and over 32% against security-savvy users. TarGuess-III and IV, for the first time, address the issue of cross-site online guessing when given the victim's one sister password and some PII.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"199 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120865241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 291
The Honey Badger of BFT Protocols BFT协议中的蜜獾
Andrew K. Miller, Yuchong Xia, Kyle Croman, E. Shi, D. Song
The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical applications, such as financial transactions. Although the conventional wisdom is to build atop a (weakly) synchronous protocol such as PBFT (or a variation thereof), such protocols rely critically on network timing assumptions, and only guarantee liveness when the network behaves as expected. We argue these protocols are ill-suited for this deployment scenario. We present an alternative, HoneyBadgerBFT, the first practical asynchronous BFT protocol, which guarantees liveness without making any timing assumptions. We base our solution on a novel atomic broadcast protocol that achieves optimal asymptotic efficiency. We present an implementation and experimental results to show our system can achieve throughput of tens of thousands of transactions per second, and scales to over a hundred nodes on a wide area network. We even conduct BFT experiments over Tor, without needing to tune any parameters. Unlike the alternatives, HoneyBadgerBFT simply does not care about the underlying network.
加密货币的惊人成功导致人们对为关键任务应用(如金融交易)部署大规模、高度健壮的拜占庭容错(BFT)协议的兴趣激增。尽管传统观点是建立在(弱)同步协议(如PBFT)(或其变体)之上,但此类协议严重依赖于网络时序假设,并且仅在网络按预期运行时保证活动。我们认为这些协议不适合这种部署场景。我们提出了一个替代方案,HoneyBadgerBFT,这是第一个实用的异步BFT协议,它保证了活动性,而不需要做任何时间假设。我们的解决方案基于一种新的原子广播协议,该协议实现了最优的渐近效率。我们给出了一个实现和实验结果,表明我们的系统可以实现每秒数万个事务的吞吐量,并且可以在广域网上扩展到100多个节点。我们甚至在Tor上进行BFT实验,而不需要调整任何参数。与其他替代方案不同,HoneyBadgerBFT根本不关心底层网络。
{"title":"The Honey Badger of BFT Protocols","authors":"Andrew K. Miller, Yuchong Xia, Kyle Croman, E. Shi, D. Song","doi":"10.1145/2976749.2978399","DOIUrl":"https://doi.org/10.1145/2976749.2978399","url":null,"abstract":"The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical applications, such as financial transactions. Although the conventional wisdom is to build atop a (weakly) synchronous protocol such as PBFT (or a variation thereof), such protocols rely critically on network timing assumptions, and only guarantee liveness when the network behaves as expected. We argue these protocols are ill-suited for this deployment scenario. We present an alternative, HoneyBadgerBFT, the first practical asynchronous BFT protocol, which guarantees liveness without making any timing assumptions. We base our solution on a novel atomic broadcast protocol that achieves optimal asymptotic efficiency. We present an implementation and experimental results to show our system can achieve throughput of tens of thousands of transactions per second, and scales to over a hundred nodes on a wide area network. We even conduct BFT experiments over Tor, without needing to tune any parameters. Unlike the alternatives, HoneyBadgerBFT simply does not care about the underlying network.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127335474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 673
Error Handling of In-vehicle Networks Makes Them Vulnerable 车载网络的错误处理使其易受攻击
Kyong-Tak Cho, K. Shin
Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle safety and efficiency, they are accompanied with new vulnerabilities. In this paper, we unveil a new important vulnerability applicable to several in-vehicle networks including Control Area Network (CAN), the de facto standard in-vehicle network protocol. Specifically, we propose a new type of Denial-of-Service (DoS), called the bus-off attack, which exploits the error-handling scheme of in-vehicle networks to disconnect or shut down good/uncompromised ECUs. This is an important attack that must be thwarted, since the attack, once an ECU is compromised, is easy to be mounted on safety-critical ECUs while its prevention is very difficult. In addition to the discovery of this new vulnerability, we analyze its feasibility using actual in-vehicle network traffic, and demonstrate the attack on a CAN bus prototype as well as on two real vehicles. Based on our analysis and experimental results, we also propose and evaluate a mechanism to detect and prevent the bus-off attack.
现代汽车配备了越来越多的电子控制单元(ecu)和无线连接。这些技术虽然提高了车辆的安全性和效率,但也伴随着新的漏洞。在本文中,我们揭示了一个新的重要漏洞,适用于几种车载网络,包括控制区域网络(CAN),事实上的标准车载网络协议。具体来说,我们提出了一种新型的拒绝服务(DoS),称为总线关闭攻击,它利用车载网络的错误处理方案断开或关闭良好/未受损的ecu。这是一个必须阻止的重要攻击,因为一旦ECU受到攻击,攻击很容易安装在安全关键的ECU上,而其预防非常困难。除了发现这个新漏洞外,我们还利用实际的车载网络流量分析了其可行性,并在CAN总线原型和两辆真实车辆上演示了攻击。基于我们的分析和实验结果,我们还提出并评估了一种检测和防止总线攻击的机制。
{"title":"Error Handling of In-vehicle Networks Makes Them Vulnerable","authors":"Kyong-Tak Cho, K. Shin","doi":"10.1145/2976749.2978302","DOIUrl":"https://doi.org/10.1145/2976749.2978302","url":null,"abstract":"Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle safety and efficiency, they are accompanied with new vulnerabilities. In this paper, we unveil a new important vulnerability applicable to several in-vehicle networks including Control Area Network (CAN), the de facto standard in-vehicle network protocol. Specifically, we propose a new type of Denial-of-Service (DoS), called the bus-off attack, which exploits the error-handling scheme of in-vehicle networks to disconnect or shut down good/uncompromised ECUs. This is an important attack that must be thwarted, since the attack, once an ECU is compromised, is easy to be mounted on safety-critical ECUs while its prevention is very difficult. In addition to the discovery of this new vulnerability, we analyze its feasibility using actual in-vehicle network traffic, and demonstrate the attack on a CAN bus prototype as well as on two real vehicles. Based on our analysis and experimental results, we also propose and evaluate a mechanism to detect and prevent the bus-off attack.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 185
Attacking OpenSSL Implementation of ECDSA with a Few Signatures 几个签名的ECDSA的OpenSSL实现
Shuqin Fan, Wenbo Wang, Qingfeng Cheng
In this work, we give a lattice attack on the ECDSA implementation in the latest version of OpenSSL, which implement the scalar multiplication by windowed Non-Adjacent Form method. We propose a totally different but more efficient method of extracting and utilizing information from the side-channel results, remarkably improving the previous attacks. First, we develop a new efficient method, which can extract almost all information from the side-channel results, obtaining 105.8 bits of information per signature on average for 256-bit ECDSA. Then in order to make the utmost of our extracted information, we translate the problem of recovering secret key to the Extended Hidden Number Problem, which can be solved by lattice reduction algorithms. Finally, we introduce the methods of elimination, merging, most significant digit recovering and enumeration to improve the attack. Our attack is mounted to the {series secp256k1} curve, and the result shows that only 4 signatures would be enough to recover the secret key if the Flush+Reload attack is implemented perfectly without any error,which is much better than the best known result needing at least 13 signatures.
本文对最新版本OpenSSL中的ECDSA实现进行了点阵攻击,该方法采用带窗口的非邻接形式方法实现了标量乘法。我们提出了一种完全不同但更有效的从侧信道结果中提取和利用信息的方法,显著改进了以前的攻击。首先,我们开发了一种新的有效方法,可以从侧信道结果中提取几乎所有的信息,对于256位的ECDSA,每个签名平均获得105.8位的信息。然后,为了最大限度地利用所提取的信息,我们将密钥恢复问题转化为可通过格约简算法求解的扩展隐数问题。最后,我们介绍了消除、合并、最高有效位数恢复和枚举的方法来改进攻击。我们将攻击装载到{series secp256k1}曲线上,结果表明,如果完美地实现Flush+Reload攻击而没有任何错误,则只需4个签名就足以恢复密钥,这比已知的至少需要13个签名的结果要好得多。
{"title":"Attacking OpenSSL Implementation of ECDSA with a Few Signatures","authors":"Shuqin Fan, Wenbo Wang, Qingfeng Cheng","doi":"10.1145/2976749.2978400","DOIUrl":"https://doi.org/10.1145/2976749.2978400","url":null,"abstract":"In this work, we give a lattice attack on the ECDSA implementation in the latest version of OpenSSL, which implement the scalar multiplication by windowed Non-Adjacent Form method. We propose a totally different but more efficient method of extracting and utilizing information from the side-channel results, remarkably improving the previous attacks. First, we develop a new efficient method, which can extract almost all information from the side-channel results, obtaining 105.8 bits of information per signature on average for 256-bit ECDSA. Then in order to make the utmost of our extracted information, we translate the problem of recovering secret key to the Extended Hidden Number Problem, which can be solved by lattice reduction algorithms. Finally, we introduce the methods of elimination, merging, most significant digit recovering and enumeration to improve the attack. Our attack is mounted to the {series secp256k1} curve, and the result shows that only 4 signatures would be enough to recover the secret key if the Flush+Reload attack is implemented perfectly without any error,which is much better than the best known result needing at least 13 signatures.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126747847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior 我是如何学会安全的:一项关于安全建议来源和行为的普查代表调查
Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek
Few users have a single, authoritative, source from whom they can request digital-security advice. Rather, digital-security skills are often learned haphazardly, as users filter through an overwhelming quantity of security advice. By understanding the factors that contribute to users' advice sources, beliefs, and security behaviors, we can help to pare down the quantity and improve the quality of advice provided to users, streamlining the process of learning key behaviors. This paper rigorously investigates how users' security beliefs, knowledge, and demographics correlate with their sources of security advice, and how all these factors influence security behaviors. Using a carefully pre-tested, U.S.-census-representative survey of 526 users, we present an overview of the prevalence of respondents' advice sources, reasons for accepting and rejecting advice from those sources, and the impact of these sources and demographic factors on security behavior. We find evidence of a "digital divide" in security: the advice sources of users with higher skill levels and socioeconomic status differ from those with fewer resources. This digital security divide may add to the vulnerability of already disadvantaged users. Additionally, we confirm and extend results from prior small-sample studies about why users accept certain digital-security advice (e.g., because they trust the source rather than the content) and reject other advice (e.g., because it is inconvenient and because it contains too much marketing material). We conclude with recommendations for combating the digital divide and improving the efficacy of digital-security advice.
很少有用户有一个单一的、权威的、可以向其寻求数字安全建议的来源。更确切地说,数字安全技能的学习往往是偶然的,因为用户要过滤大量的安全建议。通过了解影响用户建议来源、信念和安全行为的因素,我们可以帮助减少提供给用户的建议的数量,提高建议的质量,简化学习关键行为的过程。本文严格调查了用户的安全信念、知识和人口统计数据如何与他们的安全建议来源相关联,以及所有这些因素如何影响安全行为。通过对526名用户进行仔细的预先测试,我们概述了受访者的建议来源的流行程度,接受和拒绝这些来源的建议的原因,以及这些来源和人口因素对安全行为的影响。我们发现了安全领域存在“数字鸿沟”的证据:技能水平和社会经济地位较高的用户的建议来源与资源较少的用户不同。这种数字安全鸿沟可能会增加已经处于不利地位的用户的脆弱性。此外,我们确认并扩展了先前小样本研究的结果,即为什么用户接受某些数字安全建议(例如,因为他们信任来源而不是内容)并拒绝其他建议(例如,因为它不方便,因为它包含太多的营销材料)。最后,我们提出了应对数字鸿沟和提高数字安全咨询效率的建议。
{"title":"How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior","authors":"Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek","doi":"10.1145/2976749.2978307","DOIUrl":"https://doi.org/10.1145/2976749.2978307","url":null,"abstract":"Few users have a single, authoritative, source from whom they can request digital-security advice. Rather, digital-security skills are often learned haphazardly, as users filter through an overwhelming quantity of security advice. By understanding the factors that contribute to users' advice sources, beliefs, and security behaviors, we can help to pare down the quantity and improve the quality of advice provided to users, streamlining the process of learning key behaviors. This paper rigorously investigates how users' security beliefs, knowledge, and demographics correlate with their sources of security advice, and how all these factors influence security behaviors. Using a carefully pre-tested, U.S.-census-representative survey of 526 users, we present an overview of the prevalence of respondents' advice sources, reasons for accepting and rejecting advice from those sources, and the impact of these sources and demographic factors on security behavior. We find evidence of a \"digital divide\" in security: the advice sources of users with higher skill levels and socioeconomic status differ from those with fewer resources. This digital security divide may add to the vulnerability of already disadvantaged users. Additionally, we confirm and extend results from prior small-sample studies about why users accept certain digital-security advice (e.g., because they trust the source rather than the content) and reject other advice (e.g., because it is inconvenient and because it contains too much marketing material). We conclude with recommendations for combating the digital divide and improving the efficacy of digital-security advice.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115993404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 138
CCSW'16: 8th ACM Cloud Computing Security Workshop CCSW'16:第八届ACM云计算安全研讨会
Elli Androulaki, M. Reiter
Cloud computing is a dominant trend in computing for the foreseeable future; e.g., major cloud operators are now estimated to house over a million machines each and to host substantial (and growing) fractions of our IT and web infrastructure. CCSW is a forum for bringing together researchers and practitioners to discuss the implications of this trend to the security of cloud operators, tenants, and the larger Internet community. CCSW welcomes submissions on new threats, countermeasures, and opportunities brought about by the move to cloud computing, with a preference for unconventional approaches, as well as measurement studies and case studies that shed light on the security implications of clouds.
在可预见的未来,云计算是计算的主导趋势;例如,据估计,主要的云运营商每家都有超过100万台机器,并托管着我们的IT和web基础设施的大量(而且还在不断增长)部分。CCSW是一个论坛,将研究人员和实践者聚集在一起,讨论这一趋势对云运营商、租户和更大的互联网社区的安全性的影响。CCSW欢迎提交有关云计算带来的新威胁、对策和机遇的报告,并欢迎采用非传统的方法,以及有关云计算对安全影响的测量研究和案例研究。
{"title":"CCSW'16: 8th ACM Cloud Computing Security Workshop","authors":"Elli Androulaki, M. Reiter","doi":"10.1145/2976749.2990480","DOIUrl":"https://doi.org/10.1145/2976749.2990480","url":null,"abstract":"Cloud computing is a dominant trend in computing for the foreseeable future; e.g., major cloud operators are now estimated to house over a million machines each and to host substantial (and growing) fractions of our IT and web infrastructure. CCSW is a forum for bringing together researchers and practitioners to discuss the implications of this trend to the security of cloud operators, tenants, and the larger Internet community. CCSW welcomes submissions on new threats, countermeasures, and opportunities brought about by the move to cloud computing, with a preference for unconventional approaches, as well as measurement studies and case studies that shed light on the security implications of clouds.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to Credit Networks: Security, Privacy, and Applications 信用网络导论:安全、隐私和应用
Aniket Kate
Credit networks model transitive IOweYou (IOU) credit between their users. With their flexible-yet-scalable design and robustness against intrusion, we are observing a rapid increase in their popularity as a backbone of real-world permission-less payment settlement networks (e.g., Ripple and Stellar) as well as several other weak-identity systems requiring Sybil-tolerant communication. In payment scenarios, due to their unique capability to unite emerging crypto-currencies and user-defined currencies with the traditional fiat currency and banking systems, several existing and new payment enterprises are entering in this space. Nevertheless, this enthusiasm in the market significantly exceeds our understanding of security, privacy, and reliability of these inherently distributed systems. Currently employed ad hoc strategies to fix apparent flaws have made those systems vulnerable to bigger problems once they become lucrative targets for malicious players. In this tutorial, we first define the concept of IOU credit networks, and describe some of the important credit network applications. We then describe and analyze recent and ongoing projects to improve the credit-network security, privacy and reliability. We end our discussion with interesting open problems and systems challenges in the field. This introductory tutorial is accessible to the standard CCS audience with graduate-level security knowledge.
信用网络对用户之间可传递的欠条(IOU)信用进行建模。对入侵flexible-yet-scalable设计和鲁棒性,我们正在观察他们的受欢迎程度迅速增加实际permission-less支付结算网络的骨干(例如,涟漪和恒星)以及其他一些弱身份需要Sybil-tolerant通信的系统。在支付场景中,由于其将新兴加密货币和用户定义货币与传统法定货币和银行系统统一起来的独特能力,一些现有和新的支付企业正在进入这一领域。然而,市场上的这种热情大大超出了我们对这些固有分布式系统的安全性、隐私性和可靠性的理解。目前用于修复明显缺陷的临时策略,使这些系统一旦成为恶意玩家有利可图的目标,就容易出现更大的问题。在本教程中,我们首先定义了IOU信用网络的概念,并描述了一些重要的信用网络应用。然后我们描述和分析最近的和正在进行的项目改善credit-network安全、隐私和可靠性。我们以该领域有趣的开放问题和系统挑战结束我们的讨论。本入门教程适用于具有研究生级安全知识的标准CCS受众。
{"title":"Introduction to Credit Networks: Security, Privacy, and Applications","authors":"Aniket Kate","doi":"10.1145/2976749.2976755","DOIUrl":"https://doi.org/10.1145/2976749.2976755","url":null,"abstract":"Credit networks model transitive IOweYou (IOU) credit between their users. With their flexible-yet-scalable design and robustness against intrusion, we are observing a rapid increase in their popularity as a backbone of real-world permission-less payment settlement networks (e.g., Ripple and Stellar) as well as several other weak-identity systems requiring Sybil-tolerant communication. In payment scenarios, due to their unique capability to unite emerging crypto-currencies and user-defined currencies with the traditional fiat currency and banking systems, several existing and new payment enterprises are entering in this space. Nevertheless, this enthusiasm in the market significantly exceeds our understanding of security, privacy, and reliability of these inherently distributed systems. Currently employed ad hoc strategies to fix apparent flaws have made those systems vulnerable to bigger problems once they become lucrative targets for malicious players. In this tutorial, we first define the concept of IOU credit networks, and describe some of the important credit network applications. We then describe and analyze recent and ongoing projects to improve the credit-network security, privacy and reliability. We end our discussion with interesting open problems and systems challenges in the field. This introductory tutorial is accessible to the standard CCS audience with graduate-level security knowledge.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128703675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Systematic Fuzzing and Testing of TLS Libraries TLS库的系统模糊测试
Juraj Somorovsky
We present TLS-Attacker, an open source framework for evaluating the security of TLS libraries. TLS-Attacker allows security engineers to create custom TLS message flows and arbitrarily modify message contents using a simple interface in order to test the behavior of their libraries. Based on TLS-Attacker, we present a two-stage fuzzing approach to evaluate TLS server behavior. Our approach automatically searches for cryptographic failures and boundary violation vulnerabilities. It allowed us to find unusual padding oracle vulnerabilities and overflows/overreads in widely used TLS libraries, including OpenSSL, Botan, and MatrixSSL. Our findings motivate developers to create comprehensive test suites, including positive as well as negative tests, for the evaluation of TLS libraries. We use TLS-Attacker to create such a test suite framework which finds further problems in Botan.
我们提出TLS攻击者,一个用于评估TLS库安全性的开源框架。TLS- attack允许安全工程师创建自定义TLS消息流,并使用一个简单的接口任意修改消息内容,以测试其库的行为。基于TLS- attack,我们提出了一种两阶段模糊测试方法来评估TLS服务器的行为。我们的方法自动搜索密码失败和边界违反漏洞。它允许我们在广泛使用的TLS库(包括OpenSSL、Botan和MatrixSSL)中发现不寻常的填充oracle漏洞和溢出/过读。我们的发现促使开发人员创建全面的测试套件,包括正面测试和负面测试,以评估TLS库。我们使用tls - attack来创建这样一个测试套件框架,它可以在Botan中发现进一步的问题。
{"title":"Systematic Fuzzing and Testing of TLS Libraries","authors":"Juraj Somorovsky","doi":"10.1145/2976749.2978411","DOIUrl":"https://doi.org/10.1145/2976749.2978411","url":null,"abstract":"We present TLS-Attacker, an open source framework for evaluating the security of TLS libraries. TLS-Attacker allows security engineers to create custom TLS message flows and arbitrarily modify message contents using a simple interface in order to test the behavior of their libraries. Based on TLS-Attacker, we present a two-stage fuzzing approach to evaluate TLS server behavior. Our approach automatically searches for cryptographic failures and boundary violation vulnerabilities. It allowed us to find unusual padding oracle vulnerabilities and overflows/overreads in widely used TLS libraries, including OpenSSL, Botan, and MatrixSSL. Our findings motivate developers to create comprehensive test suites, including positive as well as negative tests, for the evaluation of TLS libraries. We use TLS-Attacker to create such a test suite framework which finds further problems in Botan.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128929701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols 基于段的可视化密码认证协议的安全性和可用性研究
Tianhao Wang, Huangyi Ge, Omar Chowdhury, H. K. Maji, Ninghui Li
Visual cryptography has been applied to design human computable authentication protocols. In such a protocol, the user and the server share a secret key in the form of an image printed on a transparent medium, which the user superimposes on server-generated image challenges, and visually decodes a response code from the image. An example of such protocols is PassWindow, an award-winning commercial product. We study the security and usability of segment-based visual cryptographic authentication protocols (SVAPs), which include PassWindow as a special case. In SVAP, the images consist of segments and are thus structured. Our overall findings are negative. We introduce two attacks that together are able to break all SVAPs we considered in the paper. Furthermore, our attacks exploit fundamental weaknesses of SVAPs that appear difficult to fix. We have also evaluated the usability of different SVAPs, and found that the protocol that offers the best security has the poorest usability.
视觉密码学已被应用于设计人类可计算的认证协议。在这种协议中,用户和服务器共享打印在透明介质上的图像形式的秘密密钥,用户将其叠加在服务器生成的图像挑战上,并从图像中可视地解码响应代码。此类协议的一个例子是PassWindow,这是一个屡获殊荣的商业产品。我们研究了基于段的可视密码认证协议(SVAPs)的安全性和可用性,其中PassWindow是一个特例。在SVAP中,图像由片段组成,因此是结构化的。我们的总体调查结果是负面的。我们引入了两种攻击,它们一起能够破坏我们在论文中考虑的所有svap。此外,我们的攻击利用了svap的基本弱点,而这些弱点似乎很难修复。我们还评估了不同svap的可用性,发现提供最佳安全性的协议的可用性最差。
{"title":"On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols","authors":"Tianhao Wang, Huangyi Ge, Omar Chowdhury, H. K. Maji, Ninghui Li","doi":"10.1145/2976749.2978417","DOIUrl":"https://doi.org/10.1145/2976749.2978417","url":null,"abstract":"Visual cryptography has been applied to design human computable authentication protocols. In such a protocol, the user and the server share a secret key in the form of an image printed on a transparent medium, which the user superimposes on server-generated image challenges, and visually decodes a response code from the image. An example of such protocols is PassWindow, an award-winning commercial product. We study the security and usability of segment-based visual cryptographic authentication protocols (SVAPs), which include PassWindow as a special case. In SVAP, the images consist of segments and are thus structured. Our overall findings are negative. We introduce two attacks that together are able to break all SVAPs we considered in the paper. Furthermore, our attacks exploit fundamental weaknesses of SVAPs that appear difficult to fix. We have also evaluated the usability of different SVAPs, and found that the protocol that offers the best security has the poorest usability.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1