首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model Tyr:用行为分歧模型寻找区块链系统中的共识失败bug
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179386
Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Yu Jiang, Ting Chen, Jiaguang Sun
Blockchain is a decentralized distributed system on which a large number of financial applications have been deployed. The consensus process in it plays an important role, which guarantees that legal transactions on the chain can be executed and recorded fairly and consistently. However, because of Consensus Failure Bugs (CFBs), many blockchain systems do not provide even this basic guarantee. The validity and consistency of blockchain systems rely on the soundness of complex consensus logic implementation. Any bugs which cause the blockchain consensus failure can be crucial.In this work, we introduce Tyr, an open-source tool for detecting CFBs in blockchain systems with a large number of abnormal divergent consensus behaviors. First, we design four oracle detectors to monitor the behaviors of nodes and analyze the violation of consensus properties. To trigger these oracles effectively, Tyr harnesses a behavior divergent model to constantly generate consensus messages and make nodes behave as differently as possible. We implemented and evaluated Tyr on six widely used commercial blockchain consensus systems, including IBM Fabric, WeBank FISCO-BCOS, ConsenSys Quorum, Facebook Diem, Go-Ethereum, and EOS. Compared with the state-of-the-art tools Peach, Fluffy, and Twins, Tyr covers 27.3%, 228.2%, and 297.1% more branches, respectively. Furthermore, Tyr has detected 20 serious previously unknown vulnerabilities, all of which have been repaired by the corresponding maintainers.
区块链是一个分散的分布式系统,大量的金融应用程序已经部署在其上。它的共识过程起着重要的作用,它保证了链上的合法交易可以公平一致地执行和记录。然而,由于共识失败错误(cfb),许多区块链系统甚至不提供这种基本保证。区块链系统的有效性和一致性依赖于复杂共识逻辑实现的健全性。任何导致区块链共识失败的错误都可能是至关重要的。在这项工作中,我们介绍了Tyr,一个用于检测区块链系统中存在大量异常分歧共识行为的cfb的开源工具。首先,我们设计了四个oracle检测器来监控节点的行为并分析违反共识属性的情况。为了有效地触发这些预言,Tyr利用行为发散模型不断生成共识消息,并使节点的行为尽可能不同。我们在六个广泛使用的商业区块链共识系统上实施和评估了Tyr,包括IBM Fabric, WeBank FISCO-BCOS, ConsenSys Quorum, Facebook Diem, Go-Ethereum和EOS。与最先进的工具Peach, Fluffy和Twins相比,Tyr分别覆盖了27.3%,228.2%和297.1%的分支。此外,Tyr还检测到20个以前未知的严重漏洞,所有这些漏洞都已由相应的维护人员修复。
{"title":"Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model","authors":"Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Yu Jiang, Ting Chen, Jiaguang Sun","doi":"10.1109/SP46215.2023.10179386","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179386","url":null,"abstract":"Blockchain is a decentralized distributed system on which a large number of financial applications have been deployed. The consensus process in it plays an important role, which guarantees that legal transactions on the chain can be executed and recorded fairly and consistently. However, because of Consensus Failure Bugs (CFBs), many blockchain systems do not provide even this basic guarantee. The validity and consistency of blockchain systems rely on the soundness of complex consensus logic implementation. Any bugs which cause the blockchain consensus failure can be crucial.In this work, we introduce Tyr, an open-source tool for detecting CFBs in blockchain systems with a large number of abnormal divergent consensus behaviors. First, we design four oracle detectors to monitor the behaviors of nodes and analyze the violation of consensus properties. To trigger these oracles effectively, Tyr harnesses a behavior divergent model to constantly generate consensus messages and make nodes behave as differently as possible. We implemented and evaluated Tyr on six widely used commercial blockchain consensus systems, including IBM Fabric, WeBank FISCO-BCOS, ConsenSys Quorum, Facebook Diem, Go-Ethereum, and EOS. Compared with the state-of-the-art tools Peach, Fluffy, and Twins, Tyr covers 27.3%, 228.2%, and 297.1% more branches, respectively. Furthermore, Tyr has detected 20 serious previously unknown vulnerabilities, all of which have been repaired by the corresponding maintainers.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115645164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PCSPOOF: Compromising the Safety of Time-Triggered Ethernet PCSPOOF:危及时间触发以太网的安全性
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179318
A. Loveless, L. T. Phan, R. Dreslinski, Baris Kasikci
Designers are increasingly using mixed-criticality networks in embedded systems to reduce size, weight, power, and cost. Perhaps the most successful of these technologies is Time-Triggered Ethernet (TTE), which lets critical time-triggered (TT) traffic and non-critical best-effort (BE) traffic share the same switches and cabling. A key aspect of TTE is that the TT part of the system is isolated from the BE part, and thus BE devices have no way to disrupt the operation of the TTE devices. This isolation allows designers to: (1) use untrusted, but low cost, BE hardware, (2) lower BE security requirements, and (3) ignore BE devices during safety reviews and certification procedures.We present PCSPOOF, the first attack to break TTE’s isolation guarantees. PCSPOOF is based on two key observations. First, it is possible for a BE device to infer private information about the TT part of the network that can be used to craft malicious synchronization messages. Second, by injecting electrical noise into a TTE switch over an Ethernet cable, a BE device can trick the switch into sending these malicious synchronization messages to other TTE devices. Our evaluation shows that successful attacks are possible in seconds, and that each successful attack can cause TTE devices to lose synchronization for up to a second and drop tens of TT messages — both of which can result in the failure of critical systems like aircraft or automobiles. We also show that, in a simulated spaceflight mission, PCSPOOF causes uncontrolled maneuvers that threaten safety and mission success. We disclosed PCSPOOF to aerospace companies using TTE, and several are implementing mitigations from this paper.
设计人员越来越多地在嵌入式系统中使用混合临界网络,以减小尺寸、重量、功耗和成本。这些技术中最成功的可能是时间触发以太网(TTE),它允许关键时间触发(TT)流量和非关键尽力而为(BE)流量共享相同的交换机和布线。TTE的一个关键方面是系统的TT部分与BE部分是隔离的,因此BE设备没有办法中断TTE设备的操作。这种隔离允许设计人员:(1)使用不可信但成本低的BE硬件,(2)降低BE安全要求,以及(3)在安全审查和认证过程中忽略BE设备。我们提出了PCSPOOF,这是第一个打破TTE隔离保证的攻击。PCSPOOF基于两个关键观察结果。首先,BE设备有可能推断出有关网络TT部分的私有信息,这些信息可用于制作恶意同步消息。其次,通过以太网电缆向TTE交换机注入电气噪声,BE设备可以欺骗交换机向其他TTE设备发送这些恶意同步消息。我们的评估表明,成功的攻击可能在几秒钟内发生,每次成功的攻击都可能导致TTE设备失去同步长达一秒钟,并丢失数十条TT消息——这两种情况都可能导致飞机或汽车等关键系统的故障。我们还表明,在模拟的航天任务中,PCSPOOF会导致不受控制的机动,从而威胁安全和任务的成功。我们向使用TTE的航空航天公司披露了PCSPOOF,一些公司正在实施本文提出的缓解措施。
{"title":"PCSPOOF: Compromising the Safety of Time-Triggered Ethernet","authors":"A. Loveless, L. T. Phan, R. Dreslinski, Baris Kasikci","doi":"10.1109/SP46215.2023.10179318","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179318","url":null,"abstract":"Designers are increasingly using mixed-criticality networks in embedded systems to reduce size, weight, power, and cost. Perhaps the most successful of these technologies is Time-Triggered Ethernet (TTE), which lets critical time-triggered (TT) traffic and non-critical best-effort (BE) traffic share the same switches and cabling. A key aspect of TTE is that the TT part of the system is isolated from the BE part, and thus BE devices have no way to disrupt the operation of the TTE devices. This isolation allows designers to: (1) use untrusted, but low cost, BE hardware, (2) lower BE security requirements, and (3) ignore BE devices during safety reviews and certification procedures.We present PCSPOOF, the first attack to break TTE’s isolation guarantees. PCSPOOF is based on two key observations. First, it is possible for a BE device to infer private information about the TT part of the network that can be used to craft malicious synchronization messages. Second, by injecting electrical noise into a TTE switch over an Ethernet cable, a BE device can trick the switch into sending these malicious synchronization messages to other TTE devices. Our evaluation shows that successful attacks are possible in seconds, and that each successful attack can cause TTE devices to lose synchronization for up to a second and drop tens of TT messages — both of which can result in the failure of critical systems like aircraft or automobiles. We also show that, in a simulated spaceflight mission, PCSPOOF causes uncontrolled maneuvers that threaten safety and mission success. We disclosed PCSPOOF to aerospace companies using TTE, and several are implementing mitigations from this paper.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"585 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols 任意多秘密泄漏:多出任意证明及其在RingCT协议中的应用
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179292
Tianyu Zheng, Shang Gao, Bin Xiao, Yubo Song
Ring Confidential Transaction (RingCT) protocol is an effective cryptographic component for preserving the privacy of cryptocurrencies. However, existing RingCT protocols are instantiated from one-out-of-many proofs with only one secret, leading to low efficiency and weak anonymity when handling transactions with multiple inputs. Additionally, current partial knowledge proofs with multiple secrets are neither secure nor efficient to be applied in a RingCT protocol.In this paper, we propose a novel any-out-of-many proof, a logarithmic-sized zero-knowledge proof scheme for showing the knowledge of arbitrarily many secrets out of a public list. Unlike other partial knowledge proofs that have to reveal the number of secrets [ACF21], our approach proves the knowledge of multiple secrets without leaking the exact number of them. Furthermore, we improve the efficiency of our method with a generic inner-product transformation to adopt the Bulletproofs compression [BBB+18], which reduces the proof size to 2⌈log2(N)⌉+9.Based on our proposed proof scheme, we further construct a compact RingCT protocol for privacy cryptocurrencies, which can provide a logarithmic-sized communication complexity for transactions with multiple inputs. More importantly, as the only known RingCT protocol instantiated from the partial knowledge proofs, our protocol can achieve the highest anonymity level compared with other approaches like Omniring [LRR+19]. For other applications, such as multiple ring signatures, our protocol can also be applied with some modifications. We believe our techniques are also applicable in other privacy-preserving scenarios, such as multiple ring signatures and coin-mixing in the blockchain.
环保密交易(RingCT)协议是保护加密货币隐私的有效加密组件。然而,现有的RingCT协议是由只有一个秘密的一对证明实例化的,导致在处理多输入交易时效率低,匿名性弱。此外,现有的包含多个秘密的部分知识证明在RingCT协议中既不安全也不高效。在本文中,我们提出了一种新颖的任意多的证明,一种对数大小的零知识证明方案,用于显示公共列表中任意多个秘密的知识。与其他必须揭示秘密数量的部分知识证明不同[ACF21],我们的方法证明了多个秘密的知识,而不泄露它们的确切数量。此外,我们通过一般的内积变换来提高我们的方法的效率,采用Bulletproofs压缩[BBB+18],将证明大小减小到2≤log2(N)≤9。基于我们提出的证明方案,我们进一步为隐私加密货币构建了一个紧凑的RingCT协议,该协议可以为具有多个输入的交易提供对数大小的通信复杂度。更重要的是,作为唯一已知的从部分知识证明中实例化的RingCT协议,与Omniring [LRR+19]等其他方法相比,我们的协议可以实现最高的匿名级别。对于其他应用,如多环签名,我们的协议也可以通过一些修改来应用。我们相信我们的技术也适用于其他保护隐私的场景,例如区块链中的多环签名和硬币混合。
{"title":"Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols","authors":"Tianyu Zheng, Shang Gao, Bin Xiao, Yubo Song","doi":"10.1109/SP46215.2023.10179292","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179292","url":null,"abstract":"Ring Confidential Transaction (RingCT) protocol is an effective cryptographic component for preserving the privacy of cryptocurrencies. However, existing RingCT protocols are instantiated from one-out-of-many proofs with only one secret, leading to low efficiency and weak anonymity when handling transactions with multiple inputs. Additionally, current partial knowledge proofs with multiple secrets are neither secure nor efficient to be applied in a RingCT protocol.In this paper, we propose a novel any-out-of-many proof, a logarithmic-sized zero-knowledge proof scheme for showing the knowledge of arbitrarily many secrets out of a public list. Unlike other partial knowledge proofs that have to reveal the number of secrets [ACF21], our approach proves the knowledge of multiple secrets without leaking the exact number of them. Furthermore, we improve the efficiency of our method with a generic inner-product transformation to adopt the Bulletproofs compression [BBB+18], which reduces the proof size to 2⌈log2(N)⌉+9.Based on our proposed proof scheme, we further construct a compact RingCT protocol for privacy cryptocurrencies, which can provide a logarithmic-sized communication complexity for transactions with multiple inputs. More importantly, as the only known RingCT protocol instantiated from the partial knowledge proofs, our protocol can achieve the highest anonymity level compared with other approaches like Omniring [LRR+19]. For other applications, such as multiple ring signatures, our protocol can also be applied with some modifications. We believe our techniques are also applicable in other privacy-preserving scenarios, such as multiple ring signatures and coin-mixing in the blockchain.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle PLA-LiDAR:自动驾驶车辆中基于lidar的三维目标检测的物理激光攻击
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179458
Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu
Autonomous vehicles and robots increasingly exploit LiDAR-based 3D object detection systems to detect obstacles in environment. Correct detection and classification are important to ensure safe driving. Though existing work has demonstrated the feasibility of manipulating point clouds to spoof 3D object detectors, most of the attempts are conducted digitally. In this paper, we investigate the possibility of physically fooling LiDAR-based 3D object detection by injecting adversarial point clouds using lasers. First, we develop a laser transceiver that can inject up to 4200 points, which is 20 times more than prior work, and can measure the scanning cycle of victim LiDARs to schedule the spoofing laser signals. By designing a control signal method that converts the coordinates of point clouds to control signals and an adversarial point cloud optimization method with physical constraints of LiDARs and attack capabilities, we manage to inject spoofing point cloud with desired point cloud shapes into the victim LiDAR physically. We can launch four types of attacks, i.e., naive hiding, record-based creating, optimization-based hiding, and optimization-based creating. Extensive experiments demonstrate the effectiveness of our attacks against two commercial LiDAR and three detectors. We also discuss defense strategies at the sensor and AV system levels.
自动驾驶汽车和机器人越来越多地利用基于激光雷达的3D物体检测系统来检测环境中的障碍物。正确的检测和分类对于确保安全驾驶至关重要。虽然现有的工作已经证明了操纵点云来欺骗3D目标探测器的可行性,但大多数尝试都是数字化的。在本文中,我们研究了通过使用激光注入对抗性点云来物理欺骗基于lidar的3D目标检测的可能性。首先,我们开发了一种激光收发器,可以注入多达4200个点,这是以前工作的20倍,并且可以测量受害激光雷达的扫描周期来调度欺骗激光信号。通过设计一种将点云坐标转换为控制信号的控制信号方法和一种结合激光雷达物理约束和攻击能力的对抗性点云优化方法,我们成功地将具有所需点云形状的欺骗点云物理注入到受害激光雷达中。我们可以发起四种类型的攻击,即:朴素隐藏、基于记录的创建、基于优化的隐藏和基于优化的创建。大量的实验证明了我们的攻击对两个商用激光雷达和三个探测器的有效性。我们还讨论了传感器和AV系统级别的防御策略。
{"title":"PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle","authors":"Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu","doi":"10.1109/SP46215.2023.10179458","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179458","url":null,"abstract":"Autonomous vehicles and robots increasingly exploit LiDAR-based 3D object detection systems to detect obstacles in environment. Correct detection and classification are important to ensure safe driving. Though existing work has demonstrated the feasibility of manipulating point clouds to spoof 3D object detectors, most of the attempts are conducted digitally. In this paper, we investigate the possibility of physically fooling LiDAR-based 3D object detection by injecting adversarial point clouds using lasers. First, we develop a laser transceiver that can inject up to 4200 points, which is 20 times more than prior work, and can measure the scanning cycle of victim LiDARs to schedule the spoofing laser signals. By designing a control signal method that converts the coordinates of point clouds to control signals and an adversarial point cloud optimization method with physical constraints of LiDARs and attack capabilities, we manage to inject spoofing point cloud with desired point cloud shapes into the victim LiDAR physically. We can launch four types of attacks, i.e., naive hiding, record-based creating, optimization-based hiding, and optimization-based creating. Extensive experiments demonstrate the effectiveness of our attacks against two commercial LiDAR and three detectors. We also discuss defense strategies at the sensor and AV system levels.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Spectre Declassified: Reading from the Right Place at the Wrong Time 幽灵党解密:在错误的时间从正确的地方阅读
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179355
B. Shivakumar, J. Barnes, G. Barthe, S. Cauligi, C. Chuengsatiansup, Daniel Genkin, Sioli O'Connell, P. Schwabe, Rui Qi Sim, Y. Yarom
Practical information-flow programming languages commonly allow controlled leakage via a declassify construct—programmers can use this construct to declare intentional leakage. For instance, cryptographic signatures and ciphertexts, which are computed from private keys, are viewed as secret by information-flow analyses. Cryptographic libraries can use declassify to make this data public, as it is no longer sensitive.In this paper, we study the interaction between speculative execution and declassification. We show that speculative execution leads to unintended leakage from declassification sites. Concretely, we present a PoC that recovers keys from AES implementations. Our PoC is an instance of a Spectre attack, and remains effective even when programs are compiled with speculative load hardening (SLH), a widespread compiler-based countermeasure against Spectre. We develop formal countermeasures against these attacks, including a significant improvement to SLH we term selective speculative load hardening (selSLH). These countermeasures soundly enforce relative non-interference (RNI): Informally, the speculative leakage of a protected program is limited to the existing sequential leakage of the original program. We implement our simplest countermeasure in the FaCT language and compiler—which is designed specifically for high-assurance cryptography—and we see performance overheads of at most 10%. Finally, although we do not directly implement selSLH, our preliminary evaluation suggests a significant reduction in performance cost for cryptographic functions as compared to traditional SLH.
实用的信息流编程语言通常允许通过解密构造控制泄漏——程序员可以使用该构造声明有意泄漏。例如,从私钥中计算出的加密签名和密文被信息流分析视为机密。加密库可以使用解密使这些数据公开,因为它不再敏感。在本文中,我们研究推测执行和解密之间的相互作用。我们表明,投机执行导致意外泄漏解密网站。具体地说,我们提出了一个PoC,从AES实现中恢复密钥。我们的PoC是Spectre攻击的一个实例,即使在使用推测负载强化(SLH)(一种广泛的基于编译器的针对Spectre的对策)编译程序时,PoC仍然有效。我们开发了针对这些攻击的正式对策,包括对SLH的重大改进,我们称之为选择性推测负载强化(selSLH)。这些对策很好地执行了相对不干扰(RNI):非正式地,受保护程序的推测泄漏仅限于原始程序的现有顺序泄漏。我们在FaCT语言和编译器中实现了最简单的对策——这是专门为高保证密码学设计的——我们发现性能开销最多只有10%。最后,虽然我们没有直接实现selSLH,但我们的初步评估表明,与传统的SLH相比,加密函数的性能成本显著降低。
{"title":"Spectre Declassified: Reading from the Right Place at the Wrong Time","authors":"B. Shivakumar, J. Barnes, G. Barthe, S. Cauligi, C. Chuengsatiansup, Daniel Genkin, Sioli O'Connell, P. Schwabe, Rui Qi Sim, Y. Yarom","doi":"10.1109/SP46215.2023.10179355","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179355","url":null,"abstract":"Practical information-flow programming languages commonly allow controlled leakage via a declassify construct—programmers can use this construct to declare intentional leakage. For instance, cryptographic signatures and ciphertexts, which are computed from private keys, are viewed as secret by information-flow analyses. Cryptographic libraries can use declassify to make this data public, as it is no longer sensitive.In this paper, we study the interaction between speculative execution and declassification. We show that speculative execution leads to unintended leakage from declassification sites. Concretely, we present a PoC that recovers keys from AES implementations. Our PoC is an instance of a Spectre attack, and remains effective even when programs are compiled with speculative load hardening (SLH), a widespread compiler-based countermeasure against Spectre. We develop formal countermeasures against these attacks, including a significant improvement to SLH we term selective speculative load hardening (selSLH). These countermeasures soundly enforce relative non-interference (RNI): Informally, the speculative leakage of a protected program is limited to the existing sequential leakage of the original program. We implement our simplest countermeasure in the FaCT language and compiler—which is designed specifically for high-assurance cryptography—and we see performance overheads of at most 10%. Finally, although we do not directly implement selSLH, our preliminary evaluation suggests a significant reduction in performance cost for cryptographic functions as compared to traditional SLH.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125652240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation EC:通过内核内隔离的嵌入式系统划分
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179285
Arslan Khan, Dongyan Xu, D. Tian
Embedded systems comprise of low-power microcontrollers and constitute computing systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint, the security of these systems is often overlooked, leaving a huge attack surface. For instance, an attacker compromising a user task can access any kernel data structure. Existing work has applied compartmentalization to reduce the attack surface, but these systems either incur a high runtime overhead or require major modifications to existing firmware. In this paper, we present Embedded Compartmentalizer (EC), a comprehensive and automatic compartmentalization toolchain for Real-Time Operating Systems (RTOSs) and baremetal firmware. EC provides the Embedded Compartmentalizer Compiler (ECC) to automatically partition firmware into different compartments and enforces memory protection among them using the Embedded Compartmentalizer Kernel (ECK), a formally verified microkernel implementing a novel architecture for compartmentalizing firmware using intra-kernel isolation. Our evaluation shows that EC is 1.2x faster than state-of-the-art systems and can achieve up to 96.2% ROP gadget reduction in firmwares. EC provides a low-cost, practical, and effective compartmentalization solution for embedded systems with memory protection and debug hardware extension.
嵌入式系统由低功耗微控制器组成,构成了从物联网节点到超级计算机的计算系统。不幸的是,由于低功耗的限制,这些系统的安全性往往被忽视,留下了巨大的攻击面。例如,攻击者破坏用户任务可以访问任何内核数据结构。现有的工作已经应用了分区来减少攻击面,但是这些系统要么产生很高的运行时开销,要么需要对现有固件进行重大修改。在本文中,我们提出嵌入式划分器(EC),一个全面和自动划分工具链,用于实时操作系统(RTOSs)和裸机固件。EC提供嵌入式分区器编译器(ECC)来自动将固件划分为不同的分区,并使用嵌入式分区器内核(ECK)在它们之间强制执行内存保护,ECK是一种经过正式验证的微内核,实现了一种使用内核内部隔离来划分固件的新架构。我们的评估表明,EC比最先进的系统快1.2倍,并且可以在固件中实现高达96.2%的ROP降低。EC为具有内存保护和调试硬件扩展的嵌入式系统提供了一种低成本、实用和有效的分区解决方案。
{"title":"EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation","authors":"Arslan Khan, Dongyan Xu, D. Tian","doi":"10.1109/SP46215.2023.10179285","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179285","url":null,"abstract":"Embedded systems comprise of low-power microcontrollers and constitute computing systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint, the security of these systems is often overlooked, leaving a huge attack surface. For instance, an attacker compromising a user task can access any kernel data structure. Existing work has applied compartmentalization to reduce the attack surface, but these systems either incur a high runtime overhead or require major modifications to existing firmware. In this paper, we present Embedded Compartmentalizer (EC), a comprehensive and automatic compartmentalization toolchain for Real-Time Operating Systems (RTOSs) and baremetal firmware. EC provides the Embedded Compartmentalizer Compiler (ECC) to automatically partition firmware into different compartments and enforces memory protection among them using the Embedded Compartmentalizer Kernel (ECK), a formally verified microkernel implementing a novel architecture for compartmentalizing firmware using intra-kernel isolation. Our evaluation shows that EC is 1.2x faster than state-of-the-art systems and can achieve up to 96.2% ROP gadget reduction in firmwares. EC provides a low-cost, practical, and effective compartmentalization solution for embedded systems with memory protection and debug hardware extension.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123010220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Public Verification for Private Hash Matching 私有哈希匹配的公共验证
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179349
Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer
End-to-end encryption (E2EE) prevents online services from accessing user content. This important security property is also an obstacle for content moderation methods that involve content analysis. The tension between E2EE and efforts to combat child sexual abuse material (CSAM) has become a global flashpoint in encryption policy, because the predominant method of detecting harmful content—server-side perceptual hash matching on plaintext images—is unavailable.Recent applied cryptography advances enable private hash matching (PHM), where a service can match user content against a set of known CSAM images without revealing the hash set to users or nonmatching content to the service. These designs, especially a 2021 proposal for identifying CSAM in Apple’s iCloud Photos service, have attracted widespread criticism for creating risks to security, privacy, and free expression.In this work, we aim to advance scholarship and dialogue about PHM by contributing new cryptographic methods for system verification by the general public. We begin with motivation, describing the rationale for PHM to detect CSAM and the serious societal and technical issues with its deployment. Verification could partially address shortcomings of PHM, and we systematize critiques into two areas for auditing: trust in the hash set and trust in the implementation. We explain how, while these two issues cannot be fully resolved by technology alone, there are possible cryptographic trust improvements.The central contributions of this paper are novel cryptographic protocols that enable three types of public verification for PHM systems: (1) certification that external groups approve the hash set, (2) proof that particular lawful content is not in the hash set, and (3) eventual notification to users of false positive matches. The protocols that we describe are practical, efficient, and compatible with existing PHM constructions.
端到端加密(E2EE)可以防止在线服务访问用户内容。这个重要的安全属性也是涉及内容分析的内容审核方法的一个障碍。E2EE和打击儿童性虐待材料(CSAM)之间的紧张关系已经成为加密政策中的一个全球爆发点,因为检测有害内容的主要方法——对明文图像进行服务器端感知哈希匹配——是不可用的。最近应用的加密技术进步支持私有哈希匹配(PHM),其中服务可以根据一组已知的CSAM图像匹配用户内容,而不会向用户透露哈希集或向服务透露不匹配的内容。这些设计,尤其是2021年在苹果iCloud照片服务中识别CSAM的提议,因给安全、隐私和言论自由带来风险而受到广泛批评。在这项工作中,我们的目标是通过为公众提供新的系统验证密码方法来促进关于PHM的学术研究和对话。我们从动机开始,描述PHM检测CSAM的基本原理以及其部署的严重社会和技术问题。验证可以部分地解决PHM的缺点,我们将批评系统化地分为两个领域进行审计:对哈希集的信任和对实现的信任。虽然这两个问题不能单独通过技术完全解决,但我们解释了如何改进加密信任。本文的核心贡献是新颖的加密协议,它为PHM系统提供了三种类型的公共验证:(1)外部组批准哈希集的认证,(2)证明特定的合法内容不在哈希集中,以及(3)最终通知用户误报匹配。我们描述的协议是实用的、高效的,并且与现有的PHM结构兼容。
{"title":"Public Verification for Private Hash Matching","authors":"Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer","doi":"10.1109/SP46215.2023.10179349","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179349","url":null,"abstract":"End-to-end encryption (E2EE) prevents online services from accessing user content. This important security property is also an obstacle for content moderation methods that involve content analysis. The tension between E2EE and efforts to combat child sexual abuse material (CSAM) has become a global flashpoint in encryption policy, because the predominant method of detecting harmful content—server-side perceptual hash matching on plaintext images—is unavailable.Recent applied cryptography advances enable private hash matching (PHM), where a service can match user content against a set of known CSAM images without revealing the hash set to users or nonmatching content to the service. These designs, especially a 2021 proposal for identifying CSAM in Apple’s iCloud Photos service, have attracted widespread criticism for creating risks to security, privacy, and free expression.In this work, we aim to advance scholarship and dialogue about PHM by contributing new cryptographic methods for system verification by the general public. We begin with motivation, describing the rationale for PHM to detect CSAM and the serious societal and technical issues with its deployment. Verification could partially address shortcomings of PHM, and we systematize critiques into two areas for auditing: trust in the hash set and trust in the implementation. We explain how, while these two issues cannot be fully resolved by technology alone, there are possible cryptographic trust improvements.The central contributions of this paper are novel cryptographic protocols that enable three types of public verification for PHM systems: (1) certification that external groups approve the hash set, (2) proof that particular lawful content is not in the hash set, and (3) eventual notification to users of false positive matches. The protocols that we describe are practical, efficient, and compatible with existing PHM constructions.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Typing High-Speed Cryptography against Spectre v1 对Spectre v1进行高速加密
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179418
B. Shivakumar, G. Barthe, B. Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, P. Schwabe, Lucas Tabary-Maujean
The current gold standard of cryptographic software is to write efficient libraries with systematic protections against timing attacks. In order to meet this goal, cryptographic engineers increasingly use high-assurance cryptography tools. These tools guide programmers and provide rigorous guarantees that can be verified independently by library users. However, high-assurance tools reason about overly simple execution models that elide transient execution leakage. Thus, implementations validated by high-assurance cryptography tools remain potentially vulnerable to transient execution attacks such as Spectre or Meltdown. Moreover, proposed countermeasures are not used in practice due to performance overhead.We propose, analyze, implement and evaluate an approach for writing efficient cryptographic implementations that are protected against Spectre v1 attacks. Our approach ensures speculative constant-time, an information flow property which guarantees that programs are protected against Spectre v1. Speculative constant-time is enforced by means of a (value-dependent) information flow type system. The type system tracks security levels depending on whether execution is misspeculating. We implement our approach in the Jasmin framework for high-assurance cryptography, and use it for protecting all implementations of an experimental cryptographic library that includes highly optimized implementations of symmetric primitives, of elliptic-curve cryptography, and of Kyber, a lattice-based KEM recently selected by NIST for standardization. The performance impact of our protections is very low; for example, less than 1% for Kyber and essentially zero for X25519.
当前加密软件的黄金标准是编写具有系统保护的高效库,以防止定时攻击。为了实现这一目标,密码学工程师越来越多地使用高保证的密码学工具。这些工具指导程序员,并提供严格的保证,这些保证可以由库用户独立验证。然而,高保证工具的原因是过于简单的执行模型忽略了瞬态执行泄漏。因此,通过高保证加密工具验证的实现仍然可能容易受到瞬态执行攻击,如Spectre或Meltdown。此外,由于性能开销,所提出的对策并未在实践中使用。我们提出、分析、实现和评估了一种编写有效的加密实现的方法,该方法可以防止Spectre v1攻击。我们的方法确保了推测的恒定时间,这是一种信息流属性,可以保证程序免受Spectre v1的攻击。投机常数时间是通过(依赖于值的)信息流类型系统来实现的。类型系统根据执行是否错误推测来跟踪安全级别。我们在Jasmin框架中实现了我们的方法,用于高保证密码学,并使用它来保护实验密码学库的所有实现,该库包括对称原语、椭圆曲线密码学和Kyber的高度优化实现,Kyber是NIST最近选择用于标准化的基于格子的KEM。我们的保护对性能的影响非常低;例如,Kyber不到1%,X25519基本为零。
{"title":"Typing High-Speed Cryptography against Spectre v1","authors":"B. Shivakumar, G. Barthe, B. Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, P. Schwabe, Lucas Tabary-Maujean","doi":"10.1109/SP46215.2023.10179418","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179418","url":null,"abstract":"The current gold standard of cryptographic software is to write efficient libraries with systematic protections against timing attacks. In order to meet this goal, cryptographic engineers increasingly use high-assurance cryptography tools. These tools guide programmers and provide rigorous guarantees that can be verified independently by library users. However, high-assurance tools reason about overly simple execution models that elide transient execution leakage. Thus, implementations validated by high-assurance cryptography tools remain potentially vulnerable to transient execution attacks such as Spectre or Meltdown. Moreover, proposed countermeasures are not used in practice due to performance overhead.We propose, analyze, implement and evaluate an approach for writing efficient cryptographic implementations that are protected against Spectre v1 attacks. Our approach ensures speculative constant-time, an information flow property which guarantees that programs are protected against Spectre v1. Speculative constant-time is enforced by means of a (value-dependent) information flow type system. The type system tracks security levels depending on whether execution is misspeculating. We implement our approach in the Jasmin framework for high-assurance cryptography, and use it for protecting all implementations of an experimental cryptographic library that includes highly optimized implementations of symmetric primitives, of elliptic-curve cryptography, and of Kyber, a lattice-based KEM recently selected by NIST for standardization. The performance impact of our protections is very low; for example, less than 1% for Kyber and essentially zero for X25519.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130446729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ViDeZZo: Dependency-aware Virtual Device Fuzzing ViDeZZo:依赖感知虚拟设备模糊测试
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179354
Qiang Liu, Flavio Toffalini, Yajin Zhou, Mathias Payer
A virtual machine interacts with its host environment through virtual devices, driven by virtual device messages, e.g., I/O operations. By issuing crafted messages, an adversary can exploit a vulnerability in a virtual device to escape the virtual machine, gaining host access. Even though hundreds of bugs in virtual devices have been discovered, coverage-based virtual device fuzzers hardly consider intra-message dependencies (a field in a virtual device message may be dependent on another field) and inter-message dependencies (a message may depend on a previously issued message), thus resulting in limited scalability or efficiency.ViDeZZo, our new dependency-aware fuzzing framework for virtual devices, overcomes the limitations of existing virtual device fuzzers by annotating intra-message dependencies with a lightweight grammar, and by self-learning inter-message dependencies with new mutation rules. Specifically, ViDeZZo annotates message dependencies and applies three categories of message mutators. This approach avoids heavy manual effort to analyze specifications and speeds up the slow exploration by satisfying dependencies, resulting in a scalable and efficient fuzzer that boosts bug discovery in virtual devices.In our evaluation, ViDeZZo covers two hypervisors, four architectures, five device categories, and 28 virtual devices, and reaches competitive coverage faster. Moreover, ViDeZZo successfully finds 24 existing and 28 new bugs across diverse bug types. We are actively engaging with the community with 7 of our submitted patches already accepted.
虚拟机通过虚拟设备与主机环境交互,由虚拟设备消息驱动,例如I/O操作。通过发布精心制作的消息,攻击者可以利用虚拟设备中的漏洞逃离虚拟机,获得主机访问权限。尽管已经发现了虚拟设备中的数百个错误,但基于覆盖率的虚拟设备模糊器几乎没有考虑消息内依赖关系(虚拟设备消息中的一个字段可能依赖于另一个字段)和消息间依赖关系(消息可能依赖于先前发布的消息),因此导致可伸缩性或效率有限。ViDeZZo,我们新的虚拟设备依赖感知模糊测试框架,克服了现有虚拟设备模糊测试的局限性,通过轻量级语法注释消息内依赖,并通过新的突变规则自学习消息间依赖。具体来说,ViDeZZo注释了消息依赖关系,并应用了三类消息mutator。这种方法避免了大量的手工工作来分析规范,并通过满足依赖关系来加速缓慢的探索,从而产生了一个可扩展且高效的模糊器,可以促进虚拟设备中的漏洞发现。在我们的评估中,ViDeZZo涵盖了两个管理程序、四种架构、五种设备类别和28个虚拟设备,并且更快地达到了具有竞争力的覆盖范围。此外,ViDeZZo在不同的bug类型中成功地发现了24个现有的bug和28个新的bug。我们正在积极与社区互动,我们提交的7个补丁已经被接受。
{"title":"ViDeZZo: Dependency-aware Virtual Device Fuzzing","authors":"Qiang Liu, Flavio Toffalini, Yajin Zhou, Mathias Payer","doi":"10.1109/SP46215.2023.10179354","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179354","url":null,"abstract":"A virtual machine interacts with its host environment through virtual devices, driven by virtual device messages, e.g., I/O operations. By issuing crafted messages, an adversary can exploit a vulnerability in a virtual device to escape the virtual machine, gaining host access. Even though hundreds of bugs in virtual devices have been discovered, coverage-based virtual device fuzzers hardly consider intra-message dependencies (a field in a virtual device message may be dependent on another field) and inter-message dependencies (a message may depend on a previously issued message), thus resulting in limited scalability or efficiency.ViDeZZo, our new dependency-aware fuzzing framework for virtual devices, overcomes the limitations of existing virtual device fuzzers by annotating intra-message dependencies with a lightweight grammar, and by self-learning inter-message dependencies with new mutation rules. Specifically, ViDeZZo annotates message dependencies and applies three categories of message mutators. This approach avoids heavy manual effort to analyze specifications and speeds up the slow exploration by satisfying dependencies, resulting in a scalable and efficient fuzzer that boosts bug discovery in virtual devices.In our evaluation, ViDeZZo covers two hypervisors, four architectures, five device categories, and 28 virtual devices, and reaches competitive coverage faster. Moreover, ViDeZZo successfully finds 24 existing and 28 new bugs across diverse bug types. We are actively engaging with the community with 7 of our submitted patches already accepted.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"58 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TeSec: Accurate Server-side Attack Investigation for Web Applications 对Web应用程序进行准确的服务器端攻击调查
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179402
Ruihua Wang, Yihao Peng, Yi Sun, Xuancheng Zhang, Hai Wan, Xibin Zhao
The user interface (UI) of web applications is usually the entry point of web attacks against enterprises and organizations. Finding the UI elements utilized by the intruders is of great importance both for attack interception and web application fixing. Current attack investigation methods targeting web UI either provide rough analysis results or have poor performance in high concurrency scenarios, which leads to heavy manual analysis work. In this paper, we propose TeSec, an accurate attack investigation method for web UI applications. TeSec makes use of two kinds of correlations. The first one, built from annotated audit log partitioned by PID/TID and delimiter-logs, captures the correspondence between audit log entries and web requests. The second one, modeled by an Aho-Corasick automaton built during system testing period, captures the correspondence between requests and the UI elements/events. Leveraging these two correlations, TeSec can accurately and automatically locate the UI elements/events (i.e., the root cause of the alarm) from an alarm, even in high concurrency scenarios. Furthermore, TeSec only needs to be deployed in the server and does not need to collect logs from the client-side browsers. We evaluate TeSec on 12 web applications. The experimental results show that the matching accuracy between UI events/elements and the alarm is above 99.6%. And security analysts only need to check no more than 2 UI elements on average for each individual forensics analysis. The maximum overhead of average response time and audit log space overhead are low (4.3% and 4.6% respectively).
web应用程序的用户界面(UI)通常是针对企业和组织的web攻击的切入点。找到入侵者利用的UI元素对于拦截攻击和修复web应用程序都非常重要。目前针对web UI的攻击调查方法要么分析结果粗略,要么在高并发场景下性能较差,手工分析工作量较大。本文提出了一种针对web UI应用的精确攻击调查方法——TeSec。TeSec使用了两种相关性。第一个是由由PID/TID和分隔符日志划分的带注释的审计日志构建的,它捕获审计日志条目和web请求之间的对应关系。第二个是由在系统测试期间构建的Aho-Corasick自动机建模的,它捕获请求和UI元素/事件之间的对应关系。利用这两种相关性,TeSec可以准确、自动地从警报中定位UI元素/事件(即,警报的根本原因),即使在高并发场景中也是如此。此外,TeSec只需要部署在服务器中,不需要从客户端浏览器收集日志。我们在12个web应用程序上评估了TeSec。实验结果表明,UI事件/元素与报警的匹配精度达到99.6%以上。对于每个独立的取证分析,安全分析师平均只需要检查不超过2个UI元素。平均响应时间和审计日志空间的最大开销很低(分别为4.3%和4.6%)。
{"title":"TeSec: Accurate Server-side Attack Investigation for Web Applications","authors":"Ruihua Wang, Yihao Peng, Yi Sun, Xuancheng Zhang, Hai Wan, Xibin Zhao","doi":"10.1109/SP46215.2023.10179402","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179402","url":null,"abstract":"The user interface (UI) of web applications is usually the entry point of web attacks against enterprises and organizations. Finding the UI elements utilized by the intruders is of great importance both for attack interception and web application fixing. Current attack investigation methods targeting web UI either provide rough analysis results or have poor performance in high concurrency scenarios, which leads to heavy manual analysis work. In this paper, we propose TeSec, an accurate attack investigation method for web UI applications. TeSec makes use of two kinds of correlations. The first one, built from annotated audit log partitioned by PID/TID and delimiter-logs, captures the correspondence between audit log entries and web requests. The second one, modeled by an Aho-Corasick automaton built during system testing period, captures the correspondence between requests and the UI elements/events. Leveraging these two correlations, TeSec can accurately and automatically locate the UI elements/events (i.e., the root cause of the alarm) from an alarm, even in high concurrency scenarios. Furthermore, TeSec only needs to be deployed in the server and does not need to collect logs from the client-side browsers. We evaluate TeSec on 12 web applications. The experimental results show that the matching accuracy between UI events/elements and the alarm is above 99.6%. And security analysts only need to check no more than 2 UI elements on average for each individual forensics analysis. The maximum overhead of average response time and audit log space overhead are low (4.3% and 4.6% respectively).","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1