首页 > 最新文献

Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security最新文献

英文 中文
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data 先散列,后争论:外包数据的自适应可验证计算
D. Fiore, C. Fournet, Esha Ghosh, Markulf Kohlweiss, O. Ohrimenko, Bryan Parno
Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing more trustworthy. Recent schemes enable a verifier with limited resources to delegate large computations and verify their outcome based on succinct arguments: verification complexity is linear in the size of the inputs and outputs (not the size of the computation). However, cloud computing also often involves large amounts of data, which may exceed the local storage and I/O capabilities of the verifier, and thus limit the use of VC. In this paper, we investigate multi-relation hash & prove schemes for verifiable computations that operate on succinct data hashes. Hence, the verifier delegates both storage and computation to an untrusted worker. She uploads data and keeps hashes; exchanges hashes with other parties; verifies arguments that consume and produce hashes; and selectively downloads the actual data she needs to access. Existing instantiations that fit our definition either target restricted classes of computations or employ relatively inefficient techniques. Instead, we propose efficient constructions that lift classes of existing arguments schemes for fixed relations to multi-relation hash & prove schemes. Our schemes (1) rely on hash algorithms that run linearly in the size of the input; (2) enable constant-time verification of arguments on hashed inputs; (3) incur minimal overhead for the prover. Their main benefit is to amortize the linear cost for the verifier across all relations with shared I/O. Concretely, compared to solutions that can be obtained from prior work, our new hash & prove constructions yield a 1,400x speed-up for provers. We also explain how to further reduce the linear verification costs by partially outsourcing the hash computation itself, obtaining a 480x speed-up when applied to existing VC schemes, even on single-relation executions.
可验证计算(VC)的证明系统有可能使云外包更值得信赖。最近的方案使具有有限资源的验证者能够委派大型计算并基于简洁的参数验证其结果:验证复杂性在输入和输出的大小(而不是计算的大小)中是线性的。然而,云计算也经常涉及大量数据,这些数据可能超出验证者的本地存储和I/O能力,从而限制了VC的使用。在本文中,我们研究了在简洁数据哈希上操作的可验证计算的多关系哈希和证明方案。因此,验证者将存储和计算都委托给不受信任的工作者。她上传数据并保存哈希;与其他各方交换哈希值;验证使用和产生哈希值的参数;选择性地下载她需要访问的实际数据。符合我们定义的现有实例要么针对受限制的计算类,要么采用相对低效的技术。相反,我们提出了有效的构造,将固定关系的现有参数方案提升为多关系哈希和证明方案。我们的方案(1)依赖于在输入大小上线性运行的哈希算法;(2)对散列输入的参数进行恒时验证;(3)为证明者带来最小的开销。它们的主要好处是在所有具有共享I/O的关系中分摊验证者的线性成本。具体来说,与以前的解决方案相比,我们的新哈希和证明结构为证明者带来了1400倍的速度提升。我们还解释了如何通过部分外包哈希计算本身来进一步降低线性验证成本,从而在应用于现有VC方案时获得480倍的加速,甚至在单关系执行时也是如此。
{"title":"Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data","authors":"D. Fiore, C. Fournet, Esha Ghosh, Markulf Kohlweiss, O. Ohrimenko, Bryan Parno","doi":"10.1145/2976749.2978368","DOIUrl":"https://doi.org/10.1145/2976749.2978368","url":null,"abstract":"Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing more trustworthy. Recent schemes enable a verifier with limited resources to delegate large computations and verify their outcome based on succinct arguments: verification complexity is linear in the size of the inputs and outputs (not the size of the computation). However, cloud computing also often involves large amounts of data, which may exceed the local storage and I/O capabilities of the verifier, and thus limit the use of VC. In this paper, we investigate multi-relation hash & prove schemes for verifiable computations that operate on succinct data hashes. Hence, the verifier delegates both storage and computation to an untrusted worker. She uploads data and keeps hashes; exchanges hashes with other parties; verifies arguments that consume and produce hashes; and selectively downloads the actual data she needs to access. Existing instantiations that fit our definition either target restricted classes of computations or employ relatively inefficient techniques. Instead, we propose efficient constructions that lift classes of existing arguments schemes for fixed relations to multi-relation hash & prove schemes. Our schemes (1) rely on hash algorithms that run linearly in the size of the input; (2) enable constant-time verification of arguments on hashed inputs; (3) incur minimal overhead for the prover. Their main benefit is to amortize the linear cost for the verifier across all relations with shared I/O. Concretely, compared to solutions that can be obtained from prior work, our new hash & prove constructions yield a 1,400x speed-up for provers. We also explain how to further reduce the linear verification costs by partially outsourcing the hash computation itself, obtaining a 480x speed-up when applied to existing VC schemes, even on single-relation executions.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132970056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Improvements to Secure Computation with Penalties 带惩罚的安全计算改进
R. Kumaresan, V. Vaikuntanathan, Prashant Nalini Vasudevan
Motivated by the impossibility of achieving fairness in secure computation [Cleve, STOC 1986], recent works study a model of fairness in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty to every other party that did not receive the output. These works show how to design protocols for secure computation with penalties that tolerate an arbitrary number of corruptions. In this work, we improve the efficiency of protocols for secure computation with penalties in a hybrid model where parties have access to the "claim-or-refund" transaction functionality. Our first improvement is for the ladder protocol of Bentov and Kumaresan (Crypto 2014) where we improve the dependence of the script complexity of the protocol (which corresponds to miner verification load and also space on the blockchain) on the number of parties from quadratic to linear (and in particular, is completely independent of the underlying function). Our second improvement is for the see-saw protocol of Kumaresan et al. (CCS 2015) where we reduce the total number of claim-or-refund transactions and also the script complexity from quadratic to linear in the number of parties. We also present a 'dual-mode' protocol that offers different guarantees depending on the number of corrupt parties: (1) when s n/2 parties are corrupt, this protocol guarantees fairness with penalties (i.e., if the adversary gets the output, then either the honest parties get output as well or they get compensation via penalizing the adversary). The above protocol works as long as t+s < n, matching the bound obtained for secure computation protocols in the standard model (i.e., replacing "fairness with penalties" with "security-with-abort" (full security except fairness)) by Ishai et al. (SICOMP 2011).
由于在安全计算中不可能实现公平[Cleve, STOC 1986],最近的作品研究了一种公平模型,在这种模型中,放弃接收输出的对抗方被迫向未接收输出的其他各方支付双方预定义的货币罚款。这些工作展示了如何为安全计算设计协议,并允许任意数量的损坏。在这项工作中,我们在混合模型中提高了安全计算协议的效率,其中各方可以访问“索赔或退款”交易功能。我们的第一个改进是针对Bentov和Kumaresan的阶梯协议(Crypto 2014),我们改进了协议的脚本复杂性(对应于矿工验证负载和区块链上的空间)对从二次到线性的各方数量的依赖(特别是,完全独立于底层函数)。我们的第二个改进是Kumaresan等人(CCS 2015)的跷跷板协议,在该协议中,我们减少了索赔或退款交易的总数,并将各方数量的脚本复杂性从二次型降低到线性型。我们还提出了一个“双模式”协议,根据腐败方的数量提供不同的保证:(1)当s n/2方腐败时,该协议通过惩罚保证公平(即,如果对手获得输出,那么诚实的一方也会获得输出,或者他们通过惩罚对手获得补偿)。上述协议只要t+s < n即可工作,与Ishai等人(SICOMP 2011)在标准模型中为安全计算协议所得到的界(即用“security-with-abort”(除公平性外的完全安全)代替“fairness with penalties”)相匹配。
{"title":"Improvements to Secure Computation with Penalties","authors":"R. Kumaresan, V. Vaikuntanathan, Prashant Nalini Vasudevan","doi":"10.1145/2976749.2978421","DOIUrl":"https://doi.org/10.1145/2976749.2978421","url":null,"abstract":"Motivated by the impossibility of achieving fairness in secure computation [Cleve, STOC 1986], recent works study a model of fairness in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty to every other party that did not receive the output. These works show how to design protocols for secure computation with penalties that tolerate an arbitrary number of corruptions. In this work, we improve the efficiency of protocols for secure computation with penalties in a hybrid model where parties have access to the \"claim-or-refund\" transaction functionality. Our first improvement is for the ladder protocol of Bentov and Kumaresan (Crypto 2014) where we improve the dependence of the script complexity of the protocol (which corresponds to miner verification load and also space on the blockchain) on the number of parties from quadratic to linear (and in particular, is completely independent of the underlying function). Our second improvement is for the see-saw protocol of Kumaresan et al. (CCS 2015) where we reduce the total number of claim-or-refund transactions and also the script complexity from quadratic to linear in the number of parties. We also present a 'dual-mode' protocol that offers different guarantees depending on the number of corrupt parties: (1) when s n/2 parties are corrupt, this protocol guarantees fairness with penalties (i.e., if the adversary gets the output, then either the honest parties get output as well or they get compensation via penalizing the adversary). The above protocol works as long as t+s < n, matching the bound obtained for secure computation protocols in the standard model (i.e., replacing \"fairness with penalties\" with \"security-with-abort\" (full security except fairness)) by Ishai et al. (SICOMP 2011).","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127949721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
PhishEye: Live Monitoring of Sandboxed Phishing Kits phishheye:沙箱钓鱼工具包的实时监控
Xiao Han, Nizar Kheir, D. Balzarotti
Phishing is a form of online identity theft that deceives unaware users into disclosing their confidential information. While significant effort has been devoted to the mitigation of phishing attacks, much less is known about the entire life-cycle of these attacks in the wild, which constitutes, however, a main step toward devising comprehensive anti-phishing techniques. In this paper, we present a novel approach to sandbox live phishing kits that completely protects the privacy of victims. By using this technique, we perform a comprehensive real-world assessment of phishing attacks, their mechanisms, and the behavior of the criminals, their victims, and the security community involved in the process -- based on data collected over a period of five months. Our infrastructure allowed us to draw the first comprehensive picture of a phishing attack, from the time in which the attacker installs and tests the phishing pages on a compromised host, until the last interaction with real victims and with security researchers. Our study presents accurate measurements of the duration and effectiveness of this popular threat, and discusses many new and interesting aspects we observed by monitoring hundreds of phishing campaigns.
网络钓鱼是一种在线身份盗窃的形式,欺骗不知情的用户泄露他们的机密信息。虽然在减轻网络钓鱼攻击方面已经投入了大量的努力,但对这些攻击在野外的整个生命周期知之甚少,然而,这构成了设计全面反网络钓鱼技术的主要步骤。在本文中,我们提出了一种全新的沙箱实时网络钓鱼工具包,可以完全保护受害者的隐私。通过使用此技术,我们基于五个月收集的数据,对网络钓鱼攻击、其机制以及罪犯、受害者和参与该过程的安全社区的行为进行了全面的实际评估。我们的基础设施允许我们绘制网络钓鱼攻击的第一张全面图片,从攻击者在受损主机上安装和测试网络钓鱼页面的时间,直到最后与真正的受害者和安全研究人员进行交互。我们的研究对这种流行威胁的持续时间和有效性进行了准确的测量,并讨论了我们通过监控数百个网络钓鱼活动观察到的许多新的和有趣的方面。
{"title":"PhishEye: Live Monitoring of Sandboxed Phishing Kits","authors":"Xiao Han, Nizar Kheir, D. Balzarotti","doi":"10.1145/2976749.2978330","DOIUrl":"https://doi.org/10.1145/2976749.2978330","url":null,"abstract":"Phishing is a form of online identity theft that deceives unaware users into disclosing their confidential information. While significant effort has been devoted to the mitigation of phishing attacks, much less is known about the entire life-cycle of these attacks in the wild, which constitutes, however, a main step toward devising comprehensive anti-phishing techniques. In this paper, we present a novel approach to sandbox live phishing kits that completely protects the privacy of victims. By using this technique, we perform a comprehensive real-world assessment of phishing attacks, their mechanisms, and the behavior of the criminals, their victims, and the security community involved in the process -- based on data collected over a period of five months. Our infrastructure allowed us to draw the first comprehensive picture of a phishing attack, from the time in which the attacker installs and tests the phishing pages on a compromised host, until the last interaction with real victims and with security researchers. Our study presents accurate measurements of the duration and effectiveness of this popular threat, and discusses many new and interesting aspects we observed by monitoring hundreds of phishing campaigns.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125364624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption 基于feistel格式保持加密的消息恢复攻击
M. Bellare, V. Hoang, Stefano Tessaro
We give attacks on Feistel-based format-preserving encryption (FPE) schemes that succeed in message recovery (not merely distinguishing scheme outputs from random) when the message space is small. For $4$-bit messages, the attacks fully recover the target message using $2^{21}$ examples for the FF3 NIST standard and $2^{25}$ examples for the FF1 NIST standard. The examples include only three messages per tweak, which is what makes the attacks non-trivial even though the total number of examples exceeds the size of the domain. The attacks are rigorously analyzed in a new definitional framework of message-recovery security. The attacks are easily put out of reach by increasing the number of Feistel rounds in the standards.
当消息空间很小时,我们对基于feistel的格式保持加密(FPE)方案进行了攻击,这些方案在消息恢复(不仅仅是将方案输出与随机输出区分开来)方面取得了成功。对于$4$位的消息,攻击者使用FF3 NIST标准的$2^{21}$示例和FF1 NIST标准的$2^{25}$示例完全恢复目标消息。这些示例每个调整只包含三条消息,这使得攻击变得非常重要,即使示例的总数超过了域的大小。在一个新的消息恢复安全定义框架中对这些攻击进行了严格的分析。通过增加标准中的费斯特尔弹的数量,攻击很容易被排除在外。
{"title":"Message-Recovery Attacks on Feistel-Based Format Preserving Encryption","authors":"M. Bellare, V. Hoang, Stefano Tessaro","doi":"10.1145/2976749.2978390","DOIUrl":"https://doi.org/10.1145/2976749.2978390","url":null,"abstract":"We give attacks on Feistel-based format-preserving encryption (FPE) schemes that succeed in message recovery (not merely distinguishing scheme outputs from random) when the message space is small. For $4$-bit messages, the attacks fully recover the target message using $2^{21}$ examples for the FF3 NIST standard and $2^{25}$ examples for the FF1 NIST standard. The examples include only three messages per tweak, which is what makes the attacks non-trivial even though the total number of examples exceeds the size of the domain. The attacks are rigorously analyzed in a new definitional framework of message-recovery security. The attacks are easily put out of reach by increasing the number of Feistel rounds in the standards.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Function Secret Sharing: Improvements and Extensions 函数秘密共享:改进和扩展
Elette Boyle, N. Gilboa, Y. Ishai
Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing a function from a given function family F. More concretely, an m-party FSS scheme splits a function f : {0, 1}n -> G, for some abelian group G, into functions f1,...,fm, described by keys k1,...,km, such that f = f1 + ... + fm and every strict subset of the keys hides f. A Distributed Point Function (DPF) is a special case where F is the family of point functions, namely functions f_{a,b} that evaluate to b on the input a and to 0 on all other inputs. FSS schemes are useful for applications that involve privately reading from or writing to distributed databases while minimizing the amount of communication. These include different flavors of private information retrieval (PIR), as well as a recent application of DPF for large-scale anonymous messaging. We improve and extend previous results in several ways: * Simplified FSS constructions. We introduce a tensoring operation for FSS which is used to obtain a conceptually simpler derivation of previous constructions and present our new constructions. * Improved 2-party DPF. We reduce the key size of the PRG-based DPF scheme of Boyle et al. roughly by a factor of 4 and optimize its computational cost. The optimized DPF significantly improves the concrete costs of 2-server PIR and related primitives. * FSS for new function families. We present an efficient PRG-based 2-party FSS scheme for the family of decision trees, leaking only the topology of the tree and the internal node labels. We apply this towards FSS for multi-dimensional intervals. We also present a general technique for extending FSS schemes by increasing the number of parties. * Verifiable FSS. We present efficient protocols for verifying that keys (k*/1,...,k*/m ), obtained from a potentially malicious user, are consistent with some f in F. Such a verification may be critical for applications that involve private writing or voting by many users.
Boyle等人(Eurocrypt 2015)引入的函数秘密共享(Function Secret Sharing, FSS)提供了一种对给定函数族f中的函数进行加性秘密共享的方法。更具体地说,m方FSS方案将函数f: {0, 1}n -> G,对于某些阿贝尔群G,分成函数f1,…,fm,由键k1,…,km,使得f = f1 +…分布式点函数(DPF)是一种特殊情况,其中f是点函数族,即函数f_{A,b},在输入A时取值为b,在所有其他输入时取值为0。FSS方案对于涉及私有地从分布式数据库读取或写入数据,同时最小化通信量的应用程序非常有用。其中包括不同风格的私有信息检索(PIR),以及最近用于大规模匿名消息传递的DPF应用程序。我们从几个方面改进和扩展了以前的结果:*简化了FSS结构。我们引入了FSS的张紧操作,该操作用于获得先前结构的概念上更简单的推导并呈现我们的新结构。改进了2方DPF。我们将Boyle等人基于prg的DPF方案的密钥大小大致减少了4倍,并优化了其计算成本。优化后的DPF显著提高了2服务器PIR和相关原语的具体成本。* FSS用于新的函数族。我们提出了一种有效的基于prg的决策树族的两方FSS方案,该方案只泄漏树的拓扑结构和内部节点标签。我们将其应用于多维区间的FSS。我们还提出了一种通过增加参与方数量来扩展FSS方案的一般技术。*可验证的FSS。我们提出了有效的协议来验证密钥(k*/1,…),k*/m),从潜在的恶意用户获得,与f中的某些f一致。这样的验证对于涉及私人写作或许多用户投票的应用程序可能是至关重要的。
{"title":"Function Secret Sharing: Improvements and Extensions","authors":"Elette Boyle, N. Gilboa, Y. Ishai","doi":"10.1145/2976749.2978429","DOIUrl":"https://doi.org/10.1145/2976749.2978429","url":null,"abstract":"Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing a function from a given function family F. More concretely, an m-party FSS scheme splits a function f : {0, 1}n -> G, for some abelian group G, into functions f1,...,fm, described by keys k1,...,km, such that f = f1 + ... + fm and every strict subset of the keys hides f. A Distributed Point Function (DPF) is a special case where F is the family of point functions, namely functions f_{a,b} that evaluate to b on the input a and to 0 on all other inputs. FSS schemes are useful for applications that involve privately reading from or writing to distributed databases while minimizing the amount of communication. These include different flavors of private information retrieval (PIR), as well as a recent application of DPF for large-scale anonymous messaging. We improve and extend previous results in several ways: * Simplified FSS constructions. We introduce a tensoring operation for FSS which is used to obtain a conceptually simpler derivation of previous constructions and present our new constructions. * Improved 2-party DPF. We reduce the key size of the PRG-based DPF scheme of Boyle et al. roughly by a factor of 4 and optimize its computational cost. The optimized DPF significantly improves the concrete costs of 2-server PIR and related primitives. * FSS for new function families. We present an efficient PRG-based 2-party FSS scheme for the family of decision trees, leaking only the topology of the tree and the internal node labels. We apply this towards FSS for multi-dimensional intervals. We also present a general technique for extending FSS schemes by increasing the number of parties. * Verifiable FSS. We present efficient protocols for verifying that keys (k*/1,...,k*/m ), obtained from a potentially malicious user, are consistent with some f in F. Such a verification may be critical for applications that involve private writing or voting by many users.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
The Misuse of Android Unix Domain Sockets and Security Implications Android Unix域套接字的误用及其安全含义
Yuru Shao, Jason Ott, Yunhan Jia, Zhiyun Qian, Z. Morley Mao
In this work, we conduct the first systematic study in understanding the security properties of the usage of Unix domain sockets by both Android apps and system daemons as an IPC (Inter-process Communication) mechanism, especially for cross-layer communications between the Java and native layers. We propose a tool called SInspector to expose potential security vulnerabilities in using Unix domain sockets through the process of identifying socket addresses, detecting authentication checks, and performing data flow analysis. Our in-depth analysis revealed some serious vulnerabilities in popular apps and system daemons, such as root privilege escalation and arbitrary file access. Based on our findings, we propose countermeasures and improved practices for utilizing Unix domain sockets on Android.
在这项工作中,我们对Android应用程序和系统守护进程使用Unix域套接字作为IPC(进程间通信)机制的安全特性进行了第一次系统研究,特别是对于Java和本机层之间的跨层通信。我们提出了一个名为SInspector的工具,通过识别套接字地址、检测身份验证检查和执行数据流分析的过程,暴露使用Unix域套接字时的潜在安全漏洞。我们的深入分析揭示了流行应用程序和系统守护进程中的一些严重漏洞,例如root权限升级和任意文件访问。基于我们的发现,我们提出了在Android上利用Unix域套接字的对策和改进实践。
{"title":"The Misuse of Android Unix Domain Sockets and Security Implications","authors":"Yuru Shao, Jason Ott, Yunhan Jia, Zhiyun Qian, Z. Morley Mao","doi":"10.1145/2976749.2978297","DOIUrl":"https://doi.org/10.1145/2976749.2978297","url":null,"abstract":"In this work, we conduct the first systematic study in understanding the security properties of the usage of Unix domain sockets by both Android apps and system daemons as an IPC (Inter-process Communication) mechanism, especially for cross-layer communications between the Java and native layers. We propose a tool called SInspector to expose potential security vulnerabilities in using Unix domain sockets through the process of identifying socket addresses, detecting authentication checks, and performing data flow analysis. Our in-depth analysis revealed some serious vulnerabilities in popular apps and system daemons, such as root privilege escalation and arbitrary file access. Based on our findings, we propose countermeasures and improved practices for utilizing Unix domain sockets on Android.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records 你所有的DNS记录都指向我们:了解悬挂DNS记录的安全威胁
Daiping Liu, Shuai Hao, Haining Wang
In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but the record itself has not yet been purged from DNS. In this paper, we shed light on a largely overlooked threat in DNS posed by dangling DNS records. Our work reveals that Dare can be easily manipulated by adversaries for domain hijacking. In particular, we identify three attack vectors that an adversary can harness to exploit Dares. In a large-scale measurement study, we uncover 467 exploitable Dares in 277 Alexa top 10,000 domains and 52 edu zones, showing that Dare is a real, prevalent threat. By exploiting these Dares, an adversary can take full control of the (sub)domains and can even have them signed with a Certificate Authority (CA). It is evident that the underlying cause of exploitable Dares is the lack of authenticity checking for the resources to which that DNS record points. We then propose three defense mechanisms to effectively mitigate Dares with little human effort.
在悬空的DNS记录(Dare)中,DNS记录所指向的资源是无效的,但是记录本身还没有从DNS中清除。在本文中,我们揭示了悬挂DNS记录在很大程度上被忽视的DNS威胁。我们的工作表明,Dare可以很容易地被对手操纵进行域名劫持。特别是,我们确定了攻击者可以利用的三种攻击向量。在一项大规模的测量研究中,我们在277个Alexa前10000个域名和52个edu区域中发现了467个可利用的Dare,表明Dare是一个真实的、普遍的威胁。通过利用这些dare,攻击者可以完全控制(子)域,甚至可以使用证书颁发机构(CA)对它们进行签名。很明显,可利用的dare的潜在原因是缺乏对DNS记录所指向的资源的真实性检查。然后,我们提出了三种防御机制,以有效地减轻人类的努力。
{"title":"All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records","authors":"Daiping Liu, Shuai Hao, Haining Wang","doi":"10.1145/2976749.2978387","DOIUrl":"https://doi.org/10.1145/2976749.2978387","url":null,"abstract":"In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but the record itself has not yet been purged from DNS. In this paper, we shed light on a largely overlooked threat in DNS posed by dangling DNS records. Our work reveals that Dare can be easily manipulated by adversaries for domain hijacking. In particular, we identify three attack vectors that an adversary can harness to exploit Dares. In a large-scale measurement study, we uncover 467 exploitable Dares in 277 Alexa top 10,000 domains and 52 edu zones, showing that Dare is a real, prevalent threat. By exploiting these Dares, an adversary can take full control of the (sub)domains and can even have them signed with a Certificate Authority (CA). It is evident that the underlying cause of exploitable Dares is the lack of authenticity checking for the resources to which that DNS record points. We then propose three defense mechanisms to effectively mitigate Dares with little human effort.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet MiddlePolice:在互联网中间执行目标定义的策略
Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey
Volumetric attacks, which overwhelm the bandwidth of a destination, are amongst the most common DDoS attacks today. One practical approach to addressing these attacks is to redirect all destination traffic (e.g., via DNS or BGP) to a third-party, DDoS-protection-as-a-service provider (e.g., CloudFlare) that is well provisioned and equipped with filtering mechanisms to remove attack traffic before passing the remaining benign traffic to the destination. An alternative approach is based on the concept of network capabilities, whereby source sending rates are determined by receiver consent, in the form of capabilities enforced by the network. While both third-party scrubbing services and network capabilities can be effective at reducing unwanted traffic at an overwhelmed destination, DDoS-protection-as-a-service solutions outsource all of the scheduling decisions (e.g., fairness, priority and attack identification) to the provider, while capability-based solutions require extensive modifications to existing infrastructure to operate. In this paper we introduce MiddlePolice, which seeks to marry the deployability of DDoS-protection-as-a-service solutions with the destination-based control of network capability systems. We show that by allowing feedback from the destination to the provider, MiddlePolice can effectively enforce destination-chosen policies, while requiring no deployment from unrelated parties.
容量攻击是当今最常见的DDoS攻击之一,它会淹没目标的带宽。解决这些攻击的一种实用方法是将所有目标流量(例如,通过DNS或BGP)重定向到第三方ddos保护即服务提供商(例如,CloudFlare),该提供商配置良好,并配备了过滤机制,可以在将剩余的良性流量传递到目标之前删除攻击流量。另一种方法是基于网络能力的概念,其中源发送速率由接收方同意决定,以网络强制执行的能力的形式。虽然第三方清洗服务和网络功能都可以有效地减少不堪重负的目的地的不必要流量,但ddos保护即服务解决方案将所有调度决策(例如,公平性、优先级和攻击识别)外包给提供商,而基于功能的解决方案需要对现有基础设施进行大量修改才能运行。在本文中,我们介绍了MiddlePolice,它试图将ddos保护即服务解决方案的可部署性与基于目的地的网络功能系统控制结合起来。我们展示了通过允许从目的地到提供者的反馈,MiddlePolice可以有效地执行目的地选择的策略,同时不需要不相关方的部署。
{"title":"MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet","authors":"Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey","doi":"10.1145/2976749.2978306","DOIUrl":"https://doi.org/10.1145/2976749.2978306","url":null,"abstract":"Volumetric attacks, which overwhelm the bandwidth of a destination, are amongst the most common DDoS attacks today. One practical approach to addressing these attacks is to redirect all destination traffic (e.g., via DNS or BGP) to a third-party, DDoS-protection-as-a-service provider (e.g., CloudFlare) that is well provisioned and equipped with filtering mechanisms to remove attack traffic before passing the remaining benign traffic to the destination. An alternative approach is based on the concept of network capabilities, whereby source sending rates are determined by receiver consent, in the form of capabilities enforced by the network. While both third-party scrubbing services and network capabilities can be effective at reducing unwanted traffic at an overwhelmed destination, DDoS-protection-as-a-service solutions outsource all of the scheduling decisions (e.g., fairness, priority and attack identification) to the provider, while capability-based solutions require extensive modifications to existing infrastructure to operate. In this paper we introduce MiddlePolice, which seeks to marry the deployability of DDoS-protection-as-a-service solutions with the destination-based control of network capability systems. We show that by allowing feedback from the destination to the provider, MiddlePolice can effectively enforce destination-chosen policies, while requiring no deployment from unrelated parties.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
POSTER: Towards Exposing Internet of Things: A Roadmap 海报:面向物联网:路线图
V. Sachidananda, Jinghui Toh, Shachar Siboni, A. Shabtai, Y. Elovici
Considering the exponential increase of Internet of Things (IoT) devices there is also unforeseen vulnerabilities associated with these IoT devices. One of the major problems in the IoT is the security testing and analysis due to the heterogeneous nature of deployments. Currently, there is no mechanism that performs security testing for IoT devices in different contexts. In addition, there is a missing framework to be able to adapt and tune accordingly with various security testing perspectives. In this paper, we propose an innovative security testbed targeted at IoT devices and also briefly introduce Adaptable and Tunable Framework (ATF) for testing IoT devices.
考虑到物联网(IoT)设备的指数级增长,这些物联网设备也存在不可预见的漏洞。由于部署的异构性,物联网的主要问题之一是安全测试和分析。目前,还没有一种机制可以对不同环境下的物联网设备进行安全测试。此外,还缺少一个能够根据各种安全测试透视图进行调整和调优的框架。在本文中,我们提出了一种针对物联网设备的创新安全测试平台,并简要介绍了用于测试物联网设备的自适应和可调框架(ATF)。
{"title":"POSTER: Towards Exposing Internet of Things: A Roadmap","authors":"V. Sachidananda, Jinghui Toh, Shachar Siboni, A. Shabtai, Y. Elovici","doi":"10.1145/2976749.2989046","DOIUrl":"https://doi.org/10.1145/2976749.2989046","url":null,"abstract":"Considering the exponential increase of Internet of Things (IoT) devices there is also unforeseen vulnerabilities associated with these IoT devices. One of the major problems in the IoT is the security testing and analysis due to the heterogeneous nature of deployments. Currently, there is no mechanism that performs security testing for IoT devices in different contexts. In addition, there is a missing framework to be able to adapt and tune accordingly with various security testing perspectives. In this paper, we propose an innovative security testbed targeted at IoT devices and also briefly introduce Adaptable and Tunable Framework (ATF) for testing IoT devices.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131848640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR 预取侧信道攻击:绕过SMAP和内核ASLR
D. Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, S. Mangard
Modern operating systems use hardware support to protect against control-flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is prevented and kernel mode execution is restricted to kernel code pages only. However, current CPUs provide no protection against code-reuse attacks like ROP. ASLR is used to prevent these attacks by making all addresses unpredictable for an attacker. Hence, the kernel security relies fundamentally on preventing access to address information. We introduce Prefetch Side-Channel Attacks, a new class of generic attacks exploiting major weaknesses in prefetch instructions. This allows unprivileged attackers to obtain address information and thus compromise the entire system by defeating SMAP, SMEP, and kernel ASLR. Prefetch can fetch inaccessible privileged memory into various caches on Intel x86. It also leaks the translation-level for virtual addresses on both Intel x86 and ARMv8-A. We build three attacks exploiting these properties. Our first attack retrieves an exact image of the full paging hierarchy of a process, defeating both user space and kernel space ASLR. Our second attack resolves virtual to physical addresses to bypass SMAP on 64-bit Linux systems, enabling ret2dir attacks. We demonstrate this from unprivileged user programs on Linux and inside Amazon EC2 virtual machines. Finally, we demonstrate how to defeat kernel ASLR on Windows 10, enabling ROP attacks on kernel and driver binary code. We propose a new form of strong kernel isolation to protect commodity systems incuring an overhead of only 0.06-5.09%.
现代操作系统使用硬件支持来防止控制流劫持攻击,例如代码注入攻击。通常,禁止对可执行页进行写访问,并且内核模式执行仅限于内核代码页。然而,当前的cpu没有提供针对代码重用攻击(如ROP)的保护。ASLR通过使攻击者无法预测所有地址来防止这些攻击。因此,内核安全性从根本上依赖于防止对地址信息的访问。我们介绍了预取侧通道攻击,这是一类利用预取指令主要弱点的新通用攻击。这允许无特权的攻击者获取地址信息,从而通过破坏SMAP、SMEP和内核ASLR来危害整个系统。预取可以将不可访问的特权内存提取到Intel x86上的各种缓存中。它还泄露了Intel x86和ARMv8-A上虚拟地址的翻译级别。我们利用这些属性构建了三种攻击。我们的第一个攻击获取了进程的完整分页层次结构的精确映像,同时击败了用户空间和内核空间的ASLR。我们的第二种攻击将虚拟地址解析为物理地址,以绕过64位Linux系统上的SMAP,从而启用ret2dir攻击。我们从Linux上的非特权用户程序和Amazon EC2虚拟机中演示这一点。最后,我们演示了如何击败Windows 10上的内核ASLR,使内核和驱动程序二进制代码的ROP攻击成为可能。我们提出了一种新的强内核隔离形式,以保护仅产生0.06-5.09%开销的商用系统。
{"title":"Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR","authors":"D. Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, S. Mangard","doi":"10.1145/2976749.2978356","DOIUrl":"https://doi.org/10.1145/2976749.2978356","url":null,"abstract":"Modern operating systems use hardware support to protect against control-flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is prevented and kernel mode execution is restricted to kernel code pages only. However, current CPUs provide no protection against code-reuse attacks like ROP. ASLR is used to prevent these attacks by making all addresses unpredictable for an attacker. Hence, the kernel security relies fundamentally on preventing access to address information. We introduce Prefetch Side-Channel Attacks, a new class of generic attacks exploiting major weaknesses in prefetch instructions. This allows unprivileged attackers to obtain address information and thus compromise the entire system by defeating SMAP, SMEP, and kernel ASLR. Prefetch can fetch inaccessible privileged memory into various caches on Intel x86. It also leaks the translation-level for virtual addresses on both Intel x86 and ARMv8-A. We build three attacks exploiting these properties. Our first attack retrieves an exact image of the full paging hierarchy of a process, defeating both user space and kernel space ASLR. Our second attack resolves virtual to physical addresses to bypass SMAP on 64-bit Linux systems, enabling ret2dir attacks. We demonstrate this from unprivileged user programs on Linux and inside Amazon EC2 virtual machines. Finally, we demonstrate how to defeat kernel ASLR on Windows 10, enabling ROP attacks on kernel and driver binary code. We propose a new form of strong kernel isolation to protect commodity systems incuring an overhead of only 0.06-5.09%.","PeriodicalId":432261,"journal":{"name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 217
期刊
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1