首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations 红队vs.蓝队:跨越四个现代CMOS技术世代的真实硬件木马检测案例研究
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179341
Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, A. Moradi, C. Paar
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial task – especially for security-enabled products. Depending on the concrete threat model, different techniques can be applied for this purpose. Assuming that the original IC layout is benign and free of backdoors, the primary security threats are usually identified as the outsourced manufacturing and transportation. To ensure the absence of Trojans in commissioned chips, one straightforward solution is to compare the received semiconductor devices to the design files that were initially submitted to the foundry. Clearly, conducting such a comparison requires advanced laboratory equipment and qualified experts. Nevertheless, the fundamental techniques to detect Trojans which require evident changes to the silicon layout are nowadays well-understood. Despite this, there is a glaring lack of public case studies describing the process in its entirety while making the underlying datasets publicly available. In this work, we aim to improve upon this state of the art by presenting a public and open hardware Trojan detection case study based on four different digital ICs using a Red Team vs. Blue Team approach. Hereby, the Red Team creates small changes acting as surrogates for inserted Trojans in the layouts of 90 nm, 65 nm, 40 nm, and 28 nm ICs. The quest of the Blue Team is to detect all differences between digital layout and manufactured device by means of a GDSII–vs–SEM-image comparison. Can the Blue Team perform this task efficiently? Our results spark optimism for the Trojan seekers and answer common questions about the efficiency of such techniques for relevant IC sizes. Further, they allow to draw conclusions about the impact of technology scaling on the detection performance.
验证集成电路(ic)中是否存在恶意插入的木马是一项至关重要的任务,特别是对于具有安全功能的产品。根据具体的威胁模型,可以应用不同的技术来实现这一目的。假设原始IC布局是良性的,没有后门,主要的安全威胁通常被确定为外包制造和运输。为了确保委托芯片中没有木马,一个简单的解决方案是将收到的半导体器件与最初提交给代工厂的设计文件进行比较。显然,进行这样的比较需要先进的实验室设备和合格的专家。尽管如此,检测需要明显改变硅布局的木马的基本技术现在已经很好理解了。尽管如此,在使底层数据集公开可用的同时,还明显缺乏描述整个过程的公开案例研究。在这项工作中,我们的目标是通过使用红队与蓝队的方法,提出一个基于四种不同数字ic的公开和开放的硬件木马检测案例研究,来改进这一技术水平。因此,红队在90 nm、65 nm、40 nm和28 nm的ic布局中进行了小的修改,作为插入木马的替代品。蓝队的任务是通过gdsii - sem图像比较来检测数字布局和制造设备之间的所有差异。蓝队能有效地完成这项任务吗?我们的结果激发了特洛伊搜索者的乐观情绪,并回答了有关此类技术在相关IC尺寸上的效率的常见问题。此外,它们允许得出关于技术缩放对检测性能影响的结论。
{"title":"Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations","authors":"Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, A. Moradi, C. Paar","doi":"10.1109/SP46215.2023.10179341","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179341","url":null,"abstract":"Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial task – especially for security-enabled products. Depending on the concrete threat model, different techniques can be applied for this purpose. Assuming that the original IC layout is benign and free of backdoors, the primary security threats are usually identified as the outsourced manufacturing and transportation. To ensure the absence of Trojans in commissioned chips, one straightforward solution is to compare the received semiconductor devices to the design files that were initially submitted to the foundry. Clearly, conducting such a comparison requires advanced laboratory equipment and qualified experts. Nevertheless, the fundamental techniques to detect Trojans which require evident changes to the silicon layout are nowadays well-understood. Despite this, there is a glaring lack of public case studies describing the process in its entirety while making the underlying datasets publicly available. In this work, we aim to improve upon this state of the art by presenting a public and open hardware Trojan detection case study based on four different digital ICs using a Red Team vs. Blue Team approach. Hereby, the Red Team creates small changes acting as surrogates for inserted Trojans in the layouts of 90 nm, 65 nm, 40 nm, and 28 nm ICs. The quest of the Blue Team is to detect all differences between digital layout and manufactured device by means of a GDSII–vs–SEM-image comparison. Can the Blue Team perform this task efficiently? Our results spark optimism for the Trojan seekers and answer common questions about the efficiency of such techniques for relevant IC sizes. Further, they allow to draw conclusions about the impact of technology scaling on the detection performance.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics GraphSPD:基于图的安全补丁检测与丰富的代码语义
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179479
Shu Wang, Xinda Wang, Kun Sun, S. Jajodia, Haining Wang, Qi Li
With the increasing popularity of open-source software, embedded vulnerabilities have been widely propagating to downstream software. Due to different maintenance policies, software vendors may silently release security patches without providing sufficient advisories (e.g., CVE). This leaves users unaware of security patches and provides attackers good chances to exploit unpatched vulnerabilities. Thus, detecting those silent security patches becomes imperative for secure software maintenance. In this paper, we propose a graph neural network based security patch detection system named GraphSPD, which represents patches as graphs with richer semantics and utilizes a patch-tailored graph model for detection. We first develop a novel graph structure called PatchCPG to represent software patches by merging two code property graphs (CPGs) for the pre-patch and post-patch source code as well as retaining the context, deleted, and added components for the patch. By applying a slicing technique, we retain the most relevant context and reduce the size of PatchCPG. Then, we develop the first end-to-end deep learning model called PatchGNN to determine if a patch is security-related directly from its graph-structured PatchCPG. PatchGNN includes a new embedding process to convert PatchCPG into a numeric format and a new multi-attributed graph convolution mechanism to adapt diverse relationships in PatchCPG. The experimental results show GraphSPD can significantly outperform the state-of-the-art approaches on security patch detection.
随着开源软件的日益普及,嵌入式漏洞已经广泛传播到下游软件。由于不同的维护策略,软件供应商可能会在没有提供足够的通知(例如,CVE)的情况下悄悄地发布安全补丁。这使得用户不知道安全补丁,并为攻击者提供了利用未修补漏洞的好机会。因此,检测这些沉默的安全补丁对于安全软件维护来说是必要的。本文提出了一种基于图神经网络的安全补丁检测系统GraphSPD,该系统将补丁表示为具有更丰富语义的图,并利用补丁定制图模型进行检测。我们首先通过合并补丁前和补丁后源代码的两个代码属性图(cpg)以及保留补丁的上下文、删除和添加组件,开发了一种称为PatchCPG的新颖图结构来表示软件补丁。通过应用切片技术,我们保留了最相关的上下文并减小了PatchCPG的大小。然后,我们开发了第一个端到端深度学习模型,称为PatchGNN,以确定补丁是否直接从其图结构的PatchCPG中与安全相关。PatchGNN包括一种新的嵌入过程,将PatchCPG转换为数字格式,以及一种新的多属性图卷积机制,以适应PatchCPG中不同的关系。实验结果表明,GraphSPD在安全补丁检测方面的性能明显优于目前最先进的方法。
{"title":"GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics","authors":"Shu Wang, Xinda Wang, Kun Sun, S. Jajodia, Haining Wang, Qi Li","doi":"10.1109/SP46215.2023.10179479","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179479","url":null,"abstract":"With the increasing popularity of open-source software, embedded vulnerabilities have been widely propagating to downstream software. Due to different maintenance policies, software vendors may silently release security patches without providing sufficient advisories (e.g., CVE). This leaves users unaware of security patches and provides attackers good chances to exploit unpatched vulnerabilities. Thus, detecting those silent security patches becomes imperative for secure software maintenance. In this paper, we propose a graph neural network based security patch detection system named GraphSPD, which represents patches as graphs with richer semantics and utilizes a patch-tailored graph model for detection. We first develop a novel graph structure called PatchCPG to represent software patches by merging two code property graphs (CPGs) for the pre-patch and post-patch source code as well as retaining the context, deleted, and added components for the patch. By applying a slicing technique, we retain the most relevant context and reduce the size of PatchCPG. Then, we develop the first end-to-end deep learning model called PatchGNN to determine if a patch is security-related directly from its graph-structured PatchCPG. PatchGNN includes a new embedding process to convert PatchCPG into a numeric format and a new multi-attributed graph convolution mechanism to adapt diverse relationships in PatchCPG. The experimental results show GraphSPD can significantly outperform the state-of-the-art approaches on security patch detection.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115683494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SecureCells: A Secure Compartmentalized Architecture SecureCells:一个安全的分区架构
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179472
Atri Bhattacharyya, Florian Hofhammer, Yuan-Fang Li, Siddharth Gupta, Andrés Sánchez, B. Falsafi, Mathias Payer
Modern programs are monolithic, combining code of varied provenance without isolation, all the while running on network-connected devices. A vulnerability in any component may compromise code and data of all other components. Compartmentalization separates programs into fault domains with limited policy-defined permissions, following the Principle of Least Privilege, preventing arbitrary interactions between components. Unfortunately, existing compartmentalization mechanisms target weak attacker models, incur high overheads, or overfit to specific use cases, precluding their general adoption. The need of the hour is a secure, performant, and flexible mechanism on which developers can reliably implement an arsenal of compartmentalized software.We present SecureCells, a novel architecture for intra-address space compartmentalization. SecureCells enforces per-Virtual Memory Area (VMA) permissions for secure and scalable access control, and introduces new userspace instructions for secure and fast compartment switching with hardware-enforced call gates and zero-copy permission transfers. SecureCells enables novel software mechanisms for call stack maintenance and register context isolation. In microbenchmarks, SecureCells switches compartments in only 8 cycles on a 5-stage in-order processor, reducing cost by an order of magnitude compared to state-of-the-art. Consequently, SecureCells helps secure high-performance software such as an in-memory key-value store with negligible overhead of less than 3%.
现代的程序是单一的,将不同来源的代码不加隔离地组合在一起,同时在网络连接的设备上运行。任何组件中的漏洞都可能危及所有其他组件的代码和数据。划分遵循最小特权原则(Principle of Least Privilege),将程序划分为具有有限策略定义权限的故障域,从而防止组件之间的任意交互。不幸的是,现有的划分机制针对的是较弱的攻击者模型,会产生较高的开销,或者过度适应特定的用例,从而阻碍了它们的普遍采用。当前的需求是一种安全、高效且灵活的机制,开发人员可以在此机制上可靠地实现一系列划分的软件。我们提出了SecureCells,一种用于地址内空间划分的新架构。SecureCells加强了每个虚拟内存区域(VMA)的权限,以实现安全和可扩展的访问控制,并引入了新的用户空间指令,通过硬件强制调用门和零复制权限传输实现安全和快速的分区切换。SecureCells为调用堆栈维护和寄存器上下文隔离提供了新的软件机制。在微基准测试中,SecureCells在5级顺序处理器上仅在8个周期内切换隔间,与最先进的处理器相比,成本降低了一个数量级。因此,SecureCells有助于保护高性能软件,例如内存中的键值存储,开销小于3%,可以忽略不计。
{"title":"SecureCells: A Secure Compartmentalized Architecture","authors":"Atri Bhattacharyya, Florian Hofhammer, Yuan-Fang Li, Siddharth Gupta, Andrés Sánchez, B. Falsafi, Mathias Payer","doi":"10.1109/SP46215.2023.10179472","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179472","url":null,"abstract":"Modern programs are monolithic, combining code of varied provenance without isolation, all the while running on network-connected devices. A vulnerability in any component may compromise code and data of all other components. Compartmentalization separates programs into fault domains with limited policy-defined permissions, following the Principle of Least Privilege, preventing arbitrary interactions between components. Unfortunately, existing compartmentalization mechanisms target weak attacker models, incur high overheads, or overfit to specific use cases, precluding their general adoption. The need of the hour is a secure, performant, and flexible mechanism on which developers can reliably implement an arsenal of compartmentalized software.We present SecureCells, a novel architecture for intra-address space compartmentalization. SecureCells enforces per-Virtual Memory Area (VMA) permissions for secure and scalable access control, and introduces new userspace instructions for secure and fast compartment switching with hardware-enforced call gates and zero-copy permission transfers. SecureCells enables novel software mechanisms for call stack maintenance and register context isolation. In microbenchmarks, SecureCells switches compartments in only 8 cycles on a 5-stage in-order processor, reducing cost by an order of magnitude compared to state-of-the-art. Consequently, SecureCells helps secure high-performance software such as an in-memory key-value store with negligible overhead of less than 3%.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124808541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture 安全标记体系结构中的控制流和指针完整性强制
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179416
Ravi Theja Gollapudi, Gokturk Yuksek, David Demicco, Matthew Cole, Gaurav Kothari, Rohit S. Kulkarni, Xin Zhang, K. Ghose, Aravind Prakash, Zerksis D. Umrigar
Control flow attacks exploit software vulnerabilities to divert the flow of control into unintended paths to ultimately execute attack code. This paper explores the use of instruction and data tagging as a general means of thwarting such control flow attacks, including attacks that rely on violating pointer integrity. Using specific types of narrow-width data tags along with narrow-width instruction tags embedded within the binary facilitates the security policies required to protect against such attacks, leading to a practically viable solution. Co-locating instruction tags close to their corresponding instructions within cache lines eliminates the need for separate mechanisms for instruction tag accesses. Information gleaned from the analysis phase of a compiler is augmented and used to generate the instruction and data tags. A full-stack implementation that consists of a modified LLVM compiler, modified Linux OS support for tags and a FPGA-implemented CPU hardware prototype for enforcing CFI, data pointer and code pointer integrity is demonstrated. With a modest hardware enhancement, the execution time of benchmark applications on the prototype system is shown to be limited to low, single-digit percentages of a baseline system without tagging.
控制流攻击利用软件漏洞将控制流转移到意想不到的路径上,最终执行攻击代码。本文探讨了指令和数据标记作为挫败此类控制流攻击的一般手段的使用,包括依赖于违反指针完整性的攻击。使用特定类型的窄宽度数据标记以及嵌入在二进制文件中的窄宽度指令标记,有助于防止此类攻击所需的安全策略,从而产生实际可行的解决方案。在缓存线路中,将指令标签放在与其对应的指令附近,消除了对指令标签访问的单独机制的需要。从编译器的分析阶段收集的信息被扩充并用于生成指令和数据标记。演示了一个全栈实现,包括一个修改的LLVM编译器,修改的Linux操作系统对标签的支持和一个fpga实现的CPU硬件原型,用于执行CFI,数据指针和代码指针的完整性。通过适度的硬件增强,基准测试应用程序在原型系统上的执行时间被限制在没有标记的基线系统的低个位数百分比。
{"title":"Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture","authors":"Ravi Theja Gollapudi, Gokturk Yuksek, David Demicco, Matthew Cole, Gaurav Kothari, Rohit S. Kulkarni, Xin Zhang, K. Ghose, Aravind Prakash, Zerksis D. Umrigar","doi":"10.1109/SP46215.2023.10179416","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179416","url":null,"abstract":"Control flow attacks exploit software vulnerabilities to divert the flow of control into unintended paths to ultimately execute attack code. This paper explores the use of instruction and data tagging as a general means of thwarting such control flow attacks, including attacks that rely on violating pointer integrity. Using specific types of narrow-width data tags along with narrow-width instruction tags embedded within the binary facilitates the security policies required to protect against such attacks, leading to a practically viable solution. Co-locating instruction tags close to their corresponding instructions within cache lines eliminates the need for separate mechanisms for instruction tag accesses. Information gleaned from the analysis phase of a compiler is augmented and used to generate the instruction and data tags. A full-stack implementation that consists of a modified LLVM compiler, modified Linux OS support for tags and a FPGA-implemented CPU hardware prototype for enforcing CFI, data pointer and code pointer integrity is demonstrated. With a modest hardware enhancement, the execution time of benchmark applications on the prototype system is shown to be limited to low, single-digit percentages of a baseline system without tagging.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise 从严峻的现实到实用的解决方案:恶意软件分类在现实世界的噪音
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179453
Xian Wu, Wenbo Guo, Jia Yan, Baris Coskun, Xinyu Xing
Malware datasets inevitably contain incorrect labels due to the shortage of expertise and experience needed for sample labeling. Previous research demonstrated that a training dataset with incorrectly labeled samples would result in inaccurate model learning. To address this problem, researchers have proposed various noise learning methods to offset the impact of incorrectly labeled samples, and in image recognition and text mining applications, these methods demonstrated great success. In this work, we apply both representative and state-of-the-art noise learning methods to real-world malware classification tasks. We surprisingly observe that none of the existing methods could minimize incorrect labels’ impact. Through a carefully designed experiment, we discover that the inefficacy mainly results from extreme data imbalance and the high percentage of incorrectly labeled data samples. As such, we further propose a new noise learning method and name it after MORSE. Unlike existing methods, MORSE customizes and extends a state-of-the-art semi-supervised learning technique. It takes possibly incorrectly labeled data as unlabeled data and thus avoids their potential negative impact on model learning. In MORSE, we also integrate a sample re-weighting method that balances the training data usage in the model learning and thus handles the data imbalance challenge. We evaluate MORSE on both our synthesized and real-world datasets. We show that MORSE could significantly outperform existing noise learning methods and minimize the impact of incorrectly labeled data.
由于缺乏样本标记所需的专业知识和经验,恶意软件数据集不可避免地包含不正确的标签。先前的研究表明,带有错误标记样本的训练数据集将导致不准确的模型学习。为了解决这个问题,研究人员提出了各种噪声学习方法来抵消错误标记样本的影响,并且在图像识别和文本挖掘应用中,这些方法取得了巨大的成功。在这项工作中,我们将代表性和最先进的噪声学习方法应用于现实世界的恶意软件分类任务。我们惊讶地发现,现有的方法都不能最大限度地减少错误标签的影响。通过精心设计的实验,我们发现无效的主要原因是极端的数据不平衡和错误标记数据样本的比例很高。因此,我们进一步提出了一种新的噪声学习方法,并以MORSE命名。与现有的方法不同,MORSE定制并扩展了最先进的半监督学习技术。它将可能被错误标记的数据视为未标记的数据,从而避免了它们对模型学习的潜在负面影响。在MORSE中,我们还集成了一种样本重加权方法,以平衡模型学习中训练数据的使用,从而解决数据不平衡的挑战。我们在我们的合成数据集和实际数据集上评估MORSE。我们表明,MORSE可以显著优于现有的噪声学习方法,并最大限度地减少错误标记数据的影响。
{"title":"From Grim Reality to Practical Solution: Malware Classification in Real-World Noise","authors":"Xian Wu, Wenbo Guo, Jia Yan, Baris Coskun, Xinyu Xing","doi":"10.1109/SP46215.2023.10179453","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179453","url":null,"abstract":"Malware datasets inevitably contain incorrect labels due to the shortage of expertise and experience needed for sample labeling. Previous research demonstrated that a training dataset with incorrectly labeled samples would result in inaccurate model learning. To address this problem, researchers have proposed various noise learning methods to offset the impact of incorrectly labeled samples, and in image recognition and text mining applications, these methods demonstrated great success. In this work, we apply both representative and state-of-the-art noise learning methods to real-world malware classification tasks. We surprisingly observe that none of the existing methods could minimize incorrect labels’ impact. Through a carefully designed experiment, we discover that the inefficacy mainly results from extreme data imbalance and the high percentage of incorrectly labeled data samples. As such, we further propose a new noise learning method and name it after MORSE. Unlike existing methods, MORSE customizes and extends a state-of-the-art semi-supervised learning technique. It takes possibly incorrectly labeled data as unlabeled data and thus avoids their potential negative impact on model learning. In MORSE, we also integrate a sample re-weighting method that balances the training data usage in the model learning and thus handles the data imbalance challenge. We evaluate MORSE on both our synthesized and real-world datasets. We show that MORSE could significantly outperform existing noise learning methods and minimize the impact of incorrectly labeled data.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126949421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TEEzz: Fuzzing Trusted Applications on COTS Android Devices TEEzz:对COTS Android设备上的可信应用进行模糊测试
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179302
Marcel Busch, Aravind Machiry, Chad Spensky, G. Vigna, Christopher Kruegel, Mathias Payer
Security and privacy-sensitive smartphone applications use trusted execution environments (TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged access to the entire system but expose little to no insight into their inner workings. Moreover, real-world TEEs enforce strict format and protocol interactions when communicating with trusted applications (TAs), which prohibits effective automated testing.TEEzz is the first TEE-aware fuzzing framework capable of effectively fuzzing TAs in situ on production smartphones, i.e., the TA runs in the encrypted and protected TEE and the fuzzer may only observe interactions with the TA but has no control over the TA’s code or data. Unlike traditional fuzzing techniques, which monitor the execution of a program being fuzzed and view its memory after a crash, TEEzz only requires a limited view of the target. TEEzz overcomes key limitations of TEE fuzzing (e.g., lack of visibility into the executed TAs, proprietary exchange formats, and value dependencies of interactions) by automatically attempting to infer the field types and message dependencies of the TA API through its interactions, designing state- and type-aware fuzzing mutators, and creating an in situ, on-device fuzzer.Due to the limited availability of systematic fuzzing research for TAs on commercial-off-the-shelf (COTS) Android devices, we extensively examine existing solutions, explore their limitations, and demonstrate how TEEzz improves the state-of-the-art. First, we show that general-purpose kernel driver fuzzers are ineffective for fuzzing TAs. Then, we establish a baseline for fuzzing TAs using a ground-truth experiment. We show that TEEzz outperforms other blackbox fuzzers, can improve greybox approaches (if TAs source code is available), and even outperforms greybox approaches for stateful targets. We found 13 previously unknown bugs in the latest versions of OPTEE TAs in total, out of which TEEzz is the only fuzzer to trigger three. We also ran TEEzz on popular phones and found 40 unique bugs for which one CVE was assigned so far.
安全和隐私敏感的智能手机应用程序使用可信执行环境(tee)来保护敏感操作免受恶意代码的攻击。按照设计,tee有权访问整个系统,但对其内部工作原理几乎一无所知。此外,现实世界的tee在与可信应用程序(ta)通信时强制执行严格的格式和协议交互,这妨碍了有效的自动化测试。TEEzz是第一个能够在生产智能手机上有效地对TA进行现场模糊测试的TEE感知模糊测试框架,也就是说,TA在加密和保护的TEE中运行,模糊测试器只能观察与TA的交互,但无法控制TA的代码或数据。与传统的模糊测试技术不同,传统的模糊测试技术监视被模糊程序的执行并在崩溃后查看其内存,TEEzz只需要对目标进行有限的观察。TEEzz通过自动尝试推断TA API的字段类型和消息依赖关系,通过TA API的交互,设计状态和类型感知的模糊变量,并创建一个原位的、设备上的模糊器,克服了TEE模糊测试的关键限制(例如,缺乏对已执行的TA的可见性、专有的交换格式和交互的值依赖关系)。由于在商用现货(COTS) Android设备上对TAs进行系统模糊测试研究的可用性有限,我们广泛地研究了现有的解决方案,探索了它们的局限性,并展示了TEEzz如何提高了最先进的技术。首先,我们证明了通用内核驱动模糊器对于模糊ta是无效的。然后,我们使用一个基础真值实验建立了模糊化TAs的基线。我们展示了TEEzz优于其他黑盒模糊器,可以改进灰盒方法(如果TAs源代码可用),甚至优于有状态目标的灰盒方法。我们在最新版本的OPTEE TAs中总共发现了13个以前未知的错误,其中TEEzz是唯一一个触发三个错误的fuzzer。我们还在流行的手机上运行TEEzz,发现了40个独特的漏洞,目前为止分配了一个CVE。
{"title":"TEEzz: Fuzzing Trusted Applications on COTS Android Devices","authors":"Marcel Busch, Aravind Machiry, Chad Spensky, G. Vigna, Christopher Kruegel, Mathias Payer","doi":"10.1109/SP46215.2023.10179302","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179302","url":null,"abstract":"Security and privacy-sensitive smartphone applications use trusted execution environments (TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged access to the entire system but expose little to no insight into their inner workings. Moreover, real-world TEEs enforce strict format and protocol interactions when communicating with trusted applications (TAs), which prohibits effective automated testing.TEEzz is the first TEE-aware fuzzing framework capable of effectively fuzzing TAs in situ on production smartphones, i.e., the TA runs in the encrypted and protected TEE and the fuzzer may only observe interactions with the TA but has no control over the TA’s code or data. Unlike traditional fuzzing techniques, which monitor the execution of a program being fuzzed and view its memory after a crash, TEEzz only requires a limited view of the target. TEEzz overcomes key limitations of TEE fuzzing (e.g., lack of visibility into the executed TAs, proprietary exchange formats, and value dependencies of interactions) by automatically attempting to infer the field types and message dependencies of the TA API through its interactions, designing state- and type-aware fuzzing mutators, and creating an in situ, on-device fuzzer.Due to the limited availability of systematic fuzzing research for TAs on commercial-off-the-shelf (COTS) Android devices, we extensively examine existing solutions, explore their limitations, and demonstrate how TEEzz improves the state-of-the-art. First, we show that general-purpose kernel driver fuzzers are ineffective for fuzzing TAs. Then, we establish a baseline for fuzzing TAs using a ground-truth experiment. We show that TEEzz outperforms other blackbox fuzzers, can improve greybox approaches (if TAs source code is available), and even outperforms greybox approaches for stateful targets. We found 13 previously unknown bugs in the latest versions of OPTEE TAs in total, out of which TEEzz is the only fuzzer to trigger three. We also ran TEEzz on popular phones and found 40 unique bugs for which one CVE was assigned so far.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127013759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AUC: Accountable Universal Composability AUC:负责的通用可组合性
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179384
M. Graf, Ralf Küsters, Daniel Rausch
Accountability is a well-established and widely used security concept that allows for obtaining undeniable cryptographic proof of misbehavior, thereby incentivizing honest behavior. There already exist several general purpose account-ability frameworks for formal game-based security analyses. Unfortunately, such game-based frameworks do not support modular security analyses, which is an important tool to handle the complexity of modern protocols.Universal composability (UC) models provide native support for modular analyses, including re-use and composition of security results. So far, accountability has mainly been modeled and analyzed in UC models for the special case of MPC protocols, with a general purpose accountability framework for UC still missing. That is, a framework that among others supports arbitrary protocols, a wide range of accountability properties, handling and mixing of accountable and non-accountable security properties, and modular analysis of accountable protocols.To close this gap, we propose AUC, the first general purpose accountability framework for UC models, which supports all of the above, based on several new concepts. We exemplify AUC in three case studies not covered by existing works. In particular, AUC unifies existing UC accountability approaches within a single framework.
问责制是一个完善且广泛使用的安全概念,它允许获得对不当行为的不可否认的加密证据,从而激励诚实的行为。对于正式的基于游戏的安全分析,已经存在几个通用的问责能力框架。不幸的是,这种基于游戏的框架不支持模块化安全分析,而模块化安全分析是处理现代协议复杂性的重要工具。通用可组合性(UC)模型为模块化分析提供原生支持,包括安全结果的重用和组合。到目前为止,问责制主要是针对MPC协议的特殊情况在UC模型中建模和分析的,UC的通用问责制框架仍然缺失。也就是说,一个框架支持任意协议、广泛的问责属性、处理和混合问责和非问责安全属性,以及对问责协议的模块化分析。为了缩小这一差距,我们提出了AUC,这是UC模型的第一个通用责任框架,它基于几个新概念支持上述所有内容。我们在三个现有作品未涵盖的案例研究中举例说明AUC。特别是,AUC在单一框架内统一了现有的UC责任方法。
{"title":"AUC: Accountable Universal Composability","authors":"M. Graf, Ralf Küsters, Daniel Rausch","doi":"10.1109/SP46215.2023.10179384","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179384","url":null,"abstract":"Accountability is a well-established and widely used security concept that allows for obtaining undeniable cryptographic proof of misbehavior, thereby incentivizing honest behavior. There already exist several general purpose account-ability frameworks for formal game-based security analyses. Unfortunately, such game-based frameworks do not support modular security analyses, which is an important tool to handle the complexity of modern protocols.Universal composability (UC) models provide native support for modular analyses, including re-use and composition of security results. So far, accountability has mainly been modeled and analyzed in UC models for the special case of MPC protocols, with a general purpose accountability framework for UC still missing. That is, a framework that among others supports arbitrary protocols, a wide range of accountability properties, handling and mixing of accountable and non-accountable security properties, and modular analysis of accountable protocols.To close this gap, we propose AUC, the first general purpose accountability framework for UC models, which supports all of the above, based on several new concepts. We exemplify AUC in three case studies not covered by existing works. In particular, AUC unifies existing UC accountability approaches within a single framework.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116493697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance 低努力VR耳机用户认证使用头部混响的声音与重放阻力
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179367
Ruxin Wang, Long Huang, Chen Wang
While Virtual Reality (VR) applications are becoming increasingly common, efficiently verifying a VR device user before granting personal access is still a challenge. Existing VR authentication methods require users to enter PINs or draw graphical passwords using controllers. Though the entry is in the virtual space, it can be observed by others in proximity and is subject to critical security issues. Furthermore, the in-air hand movements or handheld controller-based authentications require active user participation and are not time-efficient. This work proposes a low-effort VR device authentication system based on the unique skull-reverberated sounds, which can be acquired when the user wears the VR device. Specifically, when the user puts on the VR device or is wearing it to log into an online account, the proposed system actively emits an ultrasonic signal to initiate the authentication session. The signal returning to the VR device’s microphone has been reverberated by the user’s head, which is unique in size, skull shape and mass. We thus extract head biometric information from the received signal for unobtrusive VR device authentication.Though active acoustic sensing has been broadly used on mobile devices, no prior work has ever successfully applied such techniques to commodity VR devices. Because VR devices are designed to provide users with virtual reality immersion, the echo sounds used for active sensing are unwanted and severely suppressed. The raw audio before this process is also not accessible without kernel/hardware modifications. Thus, our work further solves the challenge of active acoustic sensing under echo cancellation to enable deploying our system on off-the-shelf VR devices. Additionally, we show that the echo cancellation mechanism is naturally good to prevent acoustic replay attacks. The proposed system is developed based on an autoencoder and a convolutional neural network for biometric data extraction and recognition. Experiments with a standalone and a mobile phone VR headset show that our system efficiently verifies a user and is also replay-resistant.
虽然虚拟现实(VR)应用变得越来越普遍,但在授予个人访问权限之前有效地验证VR设备用户仍然是一个挑战。现有的VR认证方法需要用户输入pin或使用控制器绘制图形密码。尽管入口位于虚拟空间中,但它可以被附近的其他人观察到,并受到关键安全问题的影响。此外,空中手部动作或基于手持控制器的身份验证需要用户积极参与,而且时间效率不高。本研究提出了一种基于独特的颅骨混响声音的低成本VR设备认证系统,该系统可以在用户佩戴VR设备时获得。具体来说,当用户戴上VR设备或佩戴它登录在线账户时,该系统会主动发出超声波信号来启动身份验证会话。返回到VR设备麦克风的信号会被用户的头部反射,用户的头部在大小、头骨形状和质量上都是独一无二的。因此,我们从接收到的信号中提取头部生物特征信息,用于不引人注目的VR设备认证。虽然主动声传感已经广泛应用于移动设备,但之前的工作从未成功地将此类技术应用于商品VR设备。由于VR设备旨在为用户提供虚拟现实沉浸感,因此用于主动感知的回声是不需要的,并且受到严重抑制。如果没有内核/硬件修改,这个过程之前的原始音频也是不可访问的。因此,我们的工作进一步解决了回声抵消下主动声传感的挑战,使我们的系统能够在现成的VR设备上部署。此外,我们表明,回声抵消机制自然是很好的防止声重放攻击。该系统基于自编码器和卷积神经网络,用于生物特征数据的提取和识别。在单机和手机VR头显上的实验表明,我们的系统可以有效地验证用户,并且可以抵抗重放。
{"title":"Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance","authors":"Ruxin Wang, Long Huang, Chen Wang","doi":"10.1109/SP46215.2023.10179367","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179367","url":null,"abstract":"While Virtual Reality (VR) applications are becoming increasingly common, efficiently verifying a VR device user before granting personal access is still a challenge. Existing VR authentication methods require users to enter PINs or draw graphical passwords using controllers. Though the entry is in the virtual space, it can be observed by others in proximity and is subject to critical security issues. Furthermore, the in-air hand movements or handheld controller-based authentications require active user participation and are not time-efficient. This work proposes a low-effort VR device authentication system based on the unique skull-reverberated sounds, which can be acquired when the user wears the VR device. Specifically, when the user puts on the VR device or is wearing it to log into an online account, the proposed system actively emits an ultrasonic signal to initiate the authentication session. The signal returning to the VR device’s microphone has been reverberated by the user’s head, which is unique in size, skull shape and mass. We thus extract head biometric information from the received signal for unobtrusive VR device authentication.Though active acoustic sensing has been broadly used on mobile devices, no prior work has ever successfully applied such techniques to commodity VR devices. Because VR devices are designed to provide users with virtual reality immersion, the echo sounds used for active sensing are unwanted and severely suppressed. The raw audio before this process is also not accessible without kernel/hardware modifications. Thus, our work further solves the challenge of active acoustic sensing under echo cancellation to enable deploying our system on off-the-shelf VR devices. Additionally, we show that the echo cancellation mechanism is naturally good to prevent acoustic replay attacks. The proposed system is developed based on an autoencoder and a convolutional neural network for biometric data extraction and recognition. Experiments with a standalone and a mobile phone VR headset show that our system efficiently verifies a user and is also replay-resistant.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122702075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany 德国对客户端扫描CSAM、恐怖主义、贩毒、吸毒和逃税的态度
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179417
Lisa Geierhaas, Fabian Otto, Maximilian Häring, Matthew Smith
In recent years, there have been a rising number of legislative efforts and proposed technical measures to weaken privacy-preserving technology, with the stated goal of countering serious crimes like child abuse. One of these proposed measures is Client-Side Scanning (CSS). CSS has been hotly debated both in the context of Apple stating their intention to deploy it in 2021 as well as EU legislation being proposed in 2022. Both sides of the argument state that they are working in the best interests of the people. To shed some light on this, we conducted a survey with a representative sample of German citizens. We investigated the general acceptance of CSS vs cloud-based scanning for different types of crimes and analyzed how trust in the German government and companies such as Google and Apple influenced our participants’ views. We found that, by and large, the majority of participants were willing to accept CSS measures to combat serious crimes such as child abuse or terrorism, but support dropped significantly for other illegal activities. However, the majority of participants who supported CSS were also worried about potential abuse, with only 20% stating that they were not concerned. These results suggest that many of our participants would be willing to have their devices scanned and accept some risks in the hope of aiding law enforcement. In our analysis, we argue that there are good reasons to not see this as a carte blanche for the introduction of CSS but as a call to action for the S&P community. More research is needed into how a population’s desire to prevent serious crime online can be achieved while mitigating the risks to privacy and society.
近年来,有越来越多的立法努力和拟议的技术措施削弱隐私保护技术,其目标是打击虐待儿童等严重犯罪。这些建议的措施之一是客户端扫描(CSS)。在苹果表示打算在2021年部署CSS以及欧盟将于2022年提出立法的背景下,CSS一直备受争议。争论的双方都声称他们的工作是为了人民的最大利益。为了阐明这一点,我们对德国公民的代表性样本进行了一项调查。我们调查了CSS与基于云的扫描对不同类型犯罪的普遍接受程度,并分析了对德国政府和谷歌、苹果等公司的信任如何影响我们参与者的观点。我们发现,大部分与会者都愿意接受社民党打击虐待儿童或恐怖主义等严重罪行的措施,但对其他非法活动的支持度则大幅下降。然而,大多数支持CSS的参与者也担心潜在的滥用,只有20%的人表示他们不担心。这些结果表明,我们的许多参与者愿意对他们的设备进行扫描,并接受一些风险,希望能帮助执法部门。在我们的分析中,我们认为有充分的理由不认为这是引入CSS的全权委托,而是对标准普尔社区的行动呼吁。如何在降低隐私和社会风险的同时,实现人们防止严重网络犯罪的愿望,还需要进行更多的研究。
{"title":"Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany","authors":"Lisa Geierhaas, Fabian Otto, Maximilian Häring, Matthew Smith","doi":"10.1109/SP46215.2023.10179417","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179417","url":null,"abstract":"In recent years, there have been a rising number of legislative efforts and proposed technical measures to weaken privacy-preserving technology, with the stated goal of countering serious crimes like child abuse. One of these proposed measures is Client-Side Scanning (CSS). CSS has been hotly debated both in the context of Apple stating their intention to deploy it in 2021 as well as EU legislation being proposed in 2022. Both sides of the argument state that they are working in the best interests of the people. To shed some light on this, we conducted a survey with a representative sample of German citizens. We investigated the general acceptance of CSS vs cloud-based scanning for different types of crimes and analyzed how trust in the German government and companies such as Google and Apple influenced our participants’ views. We found that, by and large, the majority of participants were willing to accept CSS measures to combat serious crimes such as child abuse or terrorism, but support dropped significantly for other illegal activities. However, the majority of participants who supported CSS were also worried about potential abuse, with only 20% stating that they were not concerned. These results suggest that many of our participants would be willing to have their devices scanned and accept some risks in the hope of aiding law enforcement. In our analysis, we argue that there are good reasons to not see this as a carte blanche for the introduction of CSS but as a call to action for the S&P community. More research is needed into how a population’s desire to prevent serious crime online can be achieved while mitigating the risks to privacy and society.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129761991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments 视障人士包容性电子邮件安全指标的设计与评估
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179407
Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, G. Wang
Due to the challenges to detect and filter phishing emails, it is inevitable that some phishing emails can still reach a user’s inbox. As a result, email providers such as Gmail have implemented phishing warnings to help users to better recognize phishing attempts. Existing research has primarily focused on phishing warnings for sighted users and yet it is not well understood how people with visual impairments interact with phishing emails and warnings. In this paper, we worked with a group of users (N=41) with visual impairments to study the effectiveness of existing warnings and explore more inclusive designs (using Gmail warning designs as a baseline for comparison). We took a multipronged approach including an exploratory study (to understand the challenges faced by users), user-in-the-loop design and prototyping, and the main study (to assess the impact of design choices). Our results show that users with visual impairments often miss existing Gmail warnings because the current design (e.g., warning position, HTML tags used) does not match well with screen reader users’ reading habits. The inconsistencies of the warnings (e.g., across the Standard and HTML view) also create obstacles to users. We show that an inclusive design (combining audio warning, shortcut key, and warning page overlay) can effectively increase the warning noticeability. Based on our results, we make a number of recommendations to email providers.
由于检测和过滤网络钓鱼邮件的挑战,一些网络钓鱼邮件仍然可以到达用户的收件箱是不可避免的。因此,Gmail等电子邮件提供商已经实施了网络钓鱼警告,以帮助用户更好地识别网络钓鱼企图。现有的研究主要集中在对视力正常的用户发出的网络钓鱼警告上,但人们对视障人士如何与网络钓鱼电子邮件和警告互动还不是很了解。在本文中,我们与一组有视觉障碍的用户(N=41)合作,研究现有警告的有效性,并探索更具包容性的设计(使用Gmail警告设计作为比较的基线)。我们采取了多管齐下的方法,包括探索性研究(了解用户面临的挑战),用户在循环设计和原型设计,以及主要研究(评估设计选择的影响)。我们的研究结果表明,有视觉障碍的用户经常会错过现有的Gmail警告,因为当前的设计(例如,警告位置,使用的HTML标签)与屏幕阅读器用户的阅读习惯不太匹配。警告的不一致(例如,在标准视图和HTML视图之间)也给用户造成了障碍。我们表明,一个包容性的设计(结合音频警告,快捷键和警告页面叠加)可以有效地提高警告的可见性。根据我们的结果,我们向电子邮件提供商提出了一些建议。
{"title":"Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments","authors":"Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, G. Wang","doi":"10.1109/SP46215.2023.10179407","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179407","url":null,"abstract":"Due to the challenges to detect and filter phishing emails, it is inevitable that some phishing emails can still reach a user’s inbox. As a result, email providers such as Gmail have implemented phishing warnings to help users to better recognize phishing attempts. Existing research has primarily focused on phishing warnings for sighted users and yet it is not well understood how people with visual impairments interact with phishing emails and warnings. In this paper, we worked with a group of users (N=41) with visual impairments to study the effectiveness of existing warnings and explore more inclusive designs (using Gmail warning designs as a baseline for comparison). We took a multipronged approach including an exploratory study (to understand the challenges faced by users), user-in-the-loop design and prototyping, and the main study (to assess the impact of design choices). Our results show that users with visual impairments often miss existing Gmail warnings because the current design (e.g., warning position, HTML tags used) does not match well with screen reader users’ reading habits. The inconsistencies of the warnings (e.g., across the Standard and HTML view) also create obstacles to users. We show that an inclusive design (combining audio warning, shortcut key, and warning page overlay) can effectively increase the warning noticeability. Based on our results, we make a number of recommendations to email providers.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1