首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Robust Multi-tab Website Fingerprinting Attacks in the Wild 健壮的多标签网站指纹攻击在野外
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179464
Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu
Website fingerprinting enables an eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting (WF) attacks have demonstrated effectiveness even against Tor-protected network traffic. However, existing WF attacks have critical limitations on accurately identifying websites in multi-tab browsing sessions, where the holistic pattern of individual websites is no longer preserved, and the number of tabs opened by a client is unknown a priori. In this paper, we propose ARES, a novel WF framework natively designed for multi-tab WF attacks. ARES formulates the multi-tab attack as a multi-label classification problem and solves it using a multi-classifier framework. Each classifier, designed based on a novel transformer model, identifies a specific website using its local patterns extracted from multiple traffic segments. We implement a prototype of ARES and extensively evaluate its effectiveness using our large-scale dataset collected over multiple months (by far the largest multi-tab WF dataset studied in academic papers.) The experimental results illustrate that ARES effectively achieves the multi-tab WF attack with the best F1-score of 0.907. Further, ARES remains robust even against various WF defenses.
网站指纹使窃听者能够确定用户通过加密连接访问哪些网站。最先进的网站指纹(WF)攻击已经证明了即使针对tor保护的网络流量也是有效的。然而,现有的WF攻击在多标签浏览会话中准确识别网站方面存在严重限制,其中不再保留单个网站的整体模式,并且客户端打开的标签数量是先验未知的。本文提出了一种新的WF框架ARES,该框架是针对多标签WF攻击而设计的。ARES将多标签攻击表述为一个多标签分类问题,并使用多分类器框架进行解决。每个分类器都是基于一种新的变压器模型设计的,它使用从多个流量段中提取的本地模式来识别特定的网站。我们实现了ARES的原型,并使用我们在多个月内收集的大规模数据集(迄今为止学术论文中研究的最大的多选项卡WF数据集)广泛评估了其有效性。实验结果表明,ARES有效地实现了多标签WF攻击,其最佳f1得分为0.907。此外,即使面对各种WF防御,ARES仍然保持强大。
{"title":"Robust Multi-tab Website Fingerprinting Attacks in the Wild","authors":"Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu","doi":"10.1109/SP46215.2023.10179464","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179464","url":null,"abstract":"Website fingerprinting enables an eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting (WF) attacks have demonstrated effectiveness even against Tor-protected network traffic. However, existing WF attacks have critical limitations on accurately identifying websites in multi-tab browsing sessions, where the holistic pattern of individual websites is no longer preserved, and the number of tabs opened by a client is unknown a priori. In this paper, we propose ARES, a novel WF framework natively designed for multi-tab WF attacks. ARES formulates the multi-tab attack as a multi-label classification problem and solves it using a multi-classifier framework. Each classifier, designed based on a novel transformer model, identifies a specific website using its local patterns extracted from multiple traffic segments. We implement a prototype of ARES and extensively evaluate its effectiveness using our large-scale dataset collected over multiple months (by far the largest multi-tab WF dataset studied in academic papers.) The experimental results illustrate that ARES effectively achieves the multi-tab WF attack with the best F1-score of 0.907. Further, ARES remains robust even against various WF defenses.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"198199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115575625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model Tyr:用行为分歧模型寻找区块链系统中的共识失败bug
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179386
Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Yu Jiang, Ting Chen, Jiaguang Sun
Blockchain is a decentralized distributed system on which a large number of financial applications have been deployed. The consensus process in it plays an important role, which guarantees that legal transactions on the chain can be executed and recorded fairly and consistently. However, because of Consensus Failure Bugs (CFBs), many blockchain systems do not provide even this basic guarantee. The validity and consistency of blockchain systems rely on the soundness of complex consensus logic implementation. Any bugs which cause the blockchain consensus failure can be crucial.In this work, we introduce Tyr, an open-source tool for detecting CFBs in blockchain systems with a large number of abnormal divergent consensus behaviors. First, we design four oracle detectors to monitor the behaviors of nodes and analyze the violation of consensus properties. To trigger these oracles effectively, Tyr harnesses a behavior divergent model to constantly generate consensus messages and make nodes behave as differently as possible. We implemented and evaluated Tyr on six widely used commercial blockchain consensus systems, including IBM Fabric, WeBank FISCO-BCOS, ConsenSys Quorum, Facebook Diem, Go-Ethereum, and EOS. Compared with the state-of-the-art tools Peach, Fluffy, and Twins, Tyr covers 27.3%, 228.2%, and 297.1% more branches, respectively. Furthermore, Tyr has detected 20 serious previously unknown vulnerabilities, all of which have been repaired by the corresponding maintainers.
区块链是一个分散的分布式系统,大量的金融应用程序已经部署在其上。它的共识过程起着重要的作用,它保证了链上的合法交易可以公平一致地执行和记录。然而,由于共识失败错误(cfb),许多区块链系统甚至不提供这种基本保证。区块链系统的有效性和一致性依赖于复杂共识逻辑实现的健全性。任何导致区块链共识失败的错误都可能是至关重要的。在这项工作中,我们介绍了Tyr,一个用于检测区块链系统中存在大量异常分歧共识行为的cfb的开源工具。首先,我们设计了四个oracle检测器来监控节点的行为并分析违反共识属性的情况。为了有效地触发这些预言,Tyr利用行为发散模型不断生成共识消息,并使节点的行为尽可能不同。我们在六个广泛使用的商业区块链共识系统上实施和评估了Tyr,包括IBM Fabric, WeBank FISCO-BCOS, ConsenSys Quorum, Facebook Diem, Go-Ethereum和EOS。与最先进的工具Peach, Fluffy和Twins相比,Tyr分别覆盖了27.3%,228.2%和297.1%的分支。此外,Tyr还检测到20个以前未知的严重漏洞,所有这些漏洞都已由相应的维护人员修复。
{"title":"Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model","authors":"Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Yu Jiang, Ting Chen, Jiaguang Sun","doi":"10.1109/SP46215.2023.10179386","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179386","url":null,"abstract":"Blockchain is a decentralized distributed system on which a large number of financial applications have been deployed. The consensus process in it plays an important role, which guarantees that legal transactions on the chain can be executed and recorded fairly and consistently. However, because of Consensus Failure Bugs (CFBs), many blockchain systems do not provide even this basic guarantee. The validity and consistency of blockchain systems rely on the soundness of complex consensus logic implementation. Any bugs which cause the blockchain consensus failure can be crucial.In this work, we introduce Tyr, an open-source tool for detecting CFBs in blockchain systems with a large number of abnormal divergent consensus behaviors. First, we design four oracle detectors to monitor the behaviors of nodes and analyze the violation of consensus properties. To trigger these oracles effectively, Tyr harnesses a behavior divergent model to constantly generate consensus messages and make nodes behave as differently as possible. We implemented and evaluated Tyr on six widely used commercial blockchain consensus systems, including IBM Fabric, WeBank FISCO-BCOS, ConsenSys Quorum, Facebook Diem, Go-Ethereum, and EOS. Compared with the state-of-the-art tools Peach, Fluffy, and Twins, Tyr covers 27.3%, 228.2%, and 297.1% more branches, respectively. Furthermore, Tyr has detected 20 serious previously unknown vulnerabilities, all of which have been repaired by the corresponding maintainers.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115645164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation EC:通过内核内隔离的嵌入式系统划分
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179285
Arslan Khan, Dongyan Xu, D. Tian
Embedded systems comprise of low-power microcontrollers and constitute computing systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint, the security of these systems is often overlooked, leaving a huge attack surface. For instance, an attacker compromising a user task can access any kernel data structure. Existing work has applied compartmentalization to reduce the attack surface, but these systems either incur a high runtime overhead or require major modifications to existing firmware. In this paper, we present Embedded Compartmentalizer (EC), a comprehensive and automatic compartmentalization toolchain for Real-Time Operating Systems (RTOSs) and baremetal firmware. EC provides the Embedded Compartmentalizer Compiler (ECC) to automatically partition firmware into different compartments and enforces memory protection among them using the Embedded Compartmentalizer Kernel (ECK), a formally verified microkernel implementing a novel architecture for compartmentalizing firmware using intra-kernel isolation. Our evaluation shows that EC is 1.2x faster than state-of-the-art systems and can achieve up to 96.2% ROP gadget reduction in firmwares. EC provides a low-cost, practical, and effective compartmentalization solution for embedded systems with memory protection and debug hardware extension.
嵌入式系统由低功耗微控制器组成,构成了从物联网节点到超级计算机的计算系统。不幸的是,由于低功耗的限制,这些系统的安全性往往被忽视,留下了巨大的攻击面。例如,攻击者破坏用户任务可以访问任何内核数据结构。现有的工作已经应用了分区来减少攻击面,但是这些系统要么产生很高的运行时开销,要么需要对现有固件进行重大修改。在本文中,我们提出嵌入式划分器(EC),一个全面和自动划分工具链,用于实时操作系统(RTOSs)和裸机固件。EC提供嵌入式分区器编译器(ECC)来自动将固件划分为不同的分区,并使用嵌入式分区器内核(ECK)在它们之间强制执行内存保护,ECK是一种经过正式验证的微内核,实现了一种使用内核内部隔离来划分固件的新架构。我们的评估表明,EC比最先进的系统快1.2倍,并且可以在固件中实现高达96.2%的ROP降低。EC为具有内存保护和调试硬件扩展的嵌入式系统提供了一种低成本、实用和有效的分区解决方案。
{"title":"EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation","authors":"Arslan Khan, Dongyan Xu, D. Tian","doi":"10.1109/SP46215.2023.10179285","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179285","url":null,"abstract":"Embedded systems comprise of low-power microcontrollers and constitute computing systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint, the security of these systems is often overlooked, leaving a huge attack surface. For instance, an attacker compromising a user task can access any kernel data structure. Existing work has applied compartmentalization to reduce the attack surface, but these systems either incur a high runtime overhead or require major modifications to existing firmware. In this paper, we present Embedded Compartmentalizer (EC), a comprehensive and automatic compartmentalization toolchain for Real-Time Operating Systems (RTOSs) and baremetal firmware. EC provides the Embedded Compartmentalizer Compiler (ECC) to automatically partition firmware into different compartments and enforces memory protection among them using the Embedded Compartmentalizer Kernel (ECK), a formally verified microkernel implementing a novel architecture for compartmentalizing firmware using intra-kernel isolation. Our evaluation shows that EC is 1.2x faster than state-of-the-art systems and can achieve up to 96.2% ROP gadget reduction in firmwares. EC provides a low-cost, practical, and effective compartmentalization solution for embedded systems with memory protection and debug hardware extension.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123010220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PCSPOOF: Compromising the Safety of Time-Triggered Ethernet PCSPOOF:危及时间触发以太网的安全性
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179318
A. Loveless, L. T. Phan, R. Dreslinski, Baris Kasikci
Designers are increasingly using mixed-criticality networks in embedded systems to reduce size, weight, power, and cost. Perhaps the most successful of these technologies is Time-Triggered Ethernet (TTE), which lets critical time-triggered (TT) traffic and non-critical best-effort (BE) traffic share the same switches and cabling. A key aspect of TTE is that the TT part of the system is isolated from the BE part, and thus BE devices have no way to disrupt the operation of the TTE devices. This isolation allows designers to: (1) use untrusted, but low cost, BE hardware, (2) lower BE security requirements, and (3) ignore BE devices during safety reviews and certification procedures.We present PCSPOOF, the first attack to break TTE’s isolation guarantees. PCSPOOF is based on two key observations. First, it is possible for a BE device to infer private information about the TT part of the network that can be used to craft malicious synchronization messages. Second, by injecting electrical noise into a TTE switch over an Ethernet cable, a BE device can trick the switch into sending these malicious synchronization messages to other TTE devices. Our evaluation shows that successful attacks are possible in seconds, and that each successful attack can cause TTE devices to lose synchronization for up to a second and drop tens of TT messages — both of which can result in the failure of critical systems like aircraft or automobiles. We also show that, in a simulated spaceflight mission, PCSPOOF causes uncontrolled maneuvers that threaten safety and mission success. We disclosed PCSPOOF to aerospace companies using TTE, and several are implementing mitigations from this paper.
设计人员越来越多地在嵌入式系统中使用混合临界网络,以减小尺寸、重量、功耗和成本。这些技术中最成功的可能是时间触发以太网(TTE),它允许关键时间触发(TT)流量和非关键尽力而为(BE)流量共享相同的交换机和布线。TTE的一个关键方面是系统的TT部分与BE部分是隔离的,因此BE设备没有办法中断TTE设备的操作。这种隔离允许设计人员:(1)使用不可信但成本低的BE硬件,(2)降低BE安全要求,以及(3)在安全审查和认证过程中忽略BE设备。我们提出了PCSPOOF,这是第一个打破TTE隔离保证的攻击。PCSPOOF基于两个关键观察结果。首先,BE设备有可能推断出有关网络TT部分的私有信息,这些信息可用于制作恶意同步消息。其次,通过以太网电缆向TTE交换机注入电气噪声,BE设备可以欺骗交换机向其他TTE设备发送这些恶意同步消息。我们的评估表明,成功的攻击可能在几秒钟内发生,每次成功的攻击都可能导致TTE设备失去同步长达一秒钟,并丢失数十条TT消息——这两种情况都可能导致飞机或汽车等关键系统的故障。我们还表明,在模拟的航天任务中,PCSPOOF会导致不受控制的机动,从而威胁安全和任务的成功。我们向使用TTE的航空航天公司披露了PCSPOOF,一些公司正在实施本文提出的缓解措施。
{"title":"PCSPOOF: Compromising the Safety of Time-Triggered Ethernet","authors":"A. Loveless, L. T. Phan, R. Dreslinski, Baris Kasikci","doi":"10.1109/SP46215.2023.10179318","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179318","url":null,"abstract":"Designers are increasingly using mixed-criticality networks in embedded systems to reduce size, weight, power, and cost. Perhaps the most successful of these technologies is Time-Triggered Ethernet (TTE), which lets critical time-triggered (TT) traffic and non-critical best-effort (BE) traffic share the same switches and cabling. A key aspect of TTE is that the TT part of the system is isolated from the BE part, and thus BE devices have no way to disrupt the operation of the TTE devices. This isolation allows designers to: (1) use untrusted, but low cost, BE hardware, (2) lower BE security requirements, and (3) ignore BE devices during safety reviews and certification procedures.We present PCSPOOF, the first attack to break TTE’s isolation guarantees. PCSPOOF is based on two key observations. First, it is possible for a BE device to infer private information about the TT part of the network that can be used to craft malicious synchronization messages. Second, by injecting electrical noise into a TTE switch over an Ethernet cable, a BE device can trick the switch into sending these malicious synchronization messages to other TTE devices. Our evaluation shows that successful attacks are possible in seconds, and that each successful attack can cause TTE devices to lose synchronization for up to a second and drop tens of TT messages — both of which can result in the failure of critical systems like aircraft or automobiles. We also show that, in a simulated spaceflight mission, PCSPOOF causes uncontrolled maneuvers that threaten safety and mission success. We disclosed PCSPOOF to aerospace companies using TTE, and several are implementing mitigations from this paper.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"585 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spectre Declassified: Reading from the Right Place at the Wrong Time 幽灵党解密:在错误的时间从正确的地方阅读
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179355
B. Shivakumar, J. Barnes, G. Barthe, S. Cauligi, C. Chuengsatiansup, Daniel Genkin, Sioli O'Connell, P. Schwabe, Rui Qi Sim, Y. Yarom
Practical information-flow programming languages commonly allow controlled leakage via a declassify construct—programmers can use this construct to declare intentional leakage. For instance, cryptographic signatures and ciphertexts, which are computed from private keys, are viewed as secret by information-flow analyses. Cryptographic libraries can use declassify to make this data public, as it is no longer sensitive.In this paper, we study the interaction between speculative execution and declassification. We show that speculative execution leads to unintended leakage from declassification sites. Concretely, we present a PoC that recovers keys from AES implementations. Our PoC is an instance of a Spectre attack, and remains effective even when programs are compiled with speculative load hardening (SLH), a widespread compiler-based countermeasure against Spectre. We develop formal countermeasures against these attacks, including a significant improvement to SLH we term selective speculative load hardening (selSLH). These countermeasures soundly enforce relative non-interference (RNI): Informally, the speculative leakage of a protected program is limited to the existing sequential leakage of the original program. We implement our simplest countermeasure in the FaCT language and compiler—which is designed specifically for high-assurance cryptography—and we see performance overheads of at most 10%. Finally, although we do not directly implement selSLH, our preliminary evaluation suggests a significant reduction in performance cost for cryptographic functions as compared to traditional SLH.
实用的信息流编程语言通常允许通过解密构造控制泄漏——程序员可以使用该构造声明有意泄漏。例如,从私钥中计算出的加密签名和密文被信息流分析视为机密。加密库可以使用解密使这些数据公开,因为它不再敏感。在本文中,我们研究推测执行和解密之间的相互作用。我们表明,投机执行导致意外泄漏解密网站。具体地说,我们提出了一个PoC,从AES实现中恢复密钥。我们的PoC是Spectre攻击的一个实例,即使在使用推测负载强化(SLH)(一种广泛的基于编译器的针对Spectre的对策)编译程序时,PoC仍然有效。我们开发了针对这些攻击的正式对策,包括对SLH的重大改进,我们称之为选择性推测负载强化(selSLH)。这些对策很好地执行了相对不干扰(RNI):非正式地,受保护程序的推测泄漏仅限于原始程序的现有顺序泄漏。我们在FaCT语言和编译器中实现了最简单的对策——这是专门为高保证密码学设计的——我们发现性能开销最多只有10%。最后,虽然我们没有直接实现selSLH,但我们的初步评估表明,与传统的SLH相比,加密函数的性能成本显著降低。
{"title":"Spectre Declassified: Reading from the Right Place at the Wrong Time","authors":"B. Shivakumar, J. Barnes, G. Barthe, S. Cauligi, C. Chuengsatiansup, Daniel Genkin, Sioli O'Connell, P. Schwabe, Rui Qi Sim, Y. Yarom","doi":"10.1109/SP46215.2023.10179355","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179355","url":null,"abstract":"Practical information-flow programming languages commonly allow controlled leakage via a declassify construct—programmers can use this construct to declare intentional leakage. For instance, cryptographic signatures and ciphertexts, which are computed from private keys, are viewed as secret by information-flow analyses. Cryptographic libraries can use declassify to make this data public, as it is no longer sensitive.In this paper, we study the interaction between speculative execution and declassification. We show that speculative execution leads to unintended leakage from declassification sites. Concretely, we present a PoC that recovers keys from AES implementations. Our PoC is an instance of a Spectre attack, and remains effective even when programs are compiled with speculative load hardening (SLH), a widespread compiler-based countermeasure against Spectre. We develop formal countermeasures against these attacks, including a significant improvement to SLH we term selective speculative load hardening (selSLH). These countermeasures soundly enforce relative non-interference (RNI): Informally, the speculative leakage of a protected program is limited to the existing sequential leakage of the original program. We implement our simplest countermeasure in the FaCT language and compiler—which is designed specifically for high-assurance cryptography—and we see performance overheads of at most 10%. Finally, although we do not directly implement selSLH, our preliminary evaluation suggests a significant reduction in performance cost for cryptographic functions as compared to traditional SLH.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125652240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle PLA-LiDAR:自动驾驶车辆中基于lidar的三维目标检测的物理激光攻击
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179458
Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu
Autonomous vehicles and robots increasingly exploit LiDAR-based 3D object detection systems to detect obstacles in environment. Correct detection and classification are important to ensure safe driving. Though existing work has demonstrated the feasibility of manipulating point clouds to spoof 3D object detectors, most of the attempts are conducted digitally. In this paper, we investigate the possibility of physically fooling LiDAR-based 3D object detection by injecting adversarial point clouds using lasers. First, we develop a laser transceiver that can inject up to 4200 points, which is 20 times more than prior work, and can measure the scanning cycle of victim LiDARs to schedule the spoofing laser signals. By designing a control signal method that converts the coordinates of point clouds to control signals and an adversarial point cloud optimization method with physical constraints of LiDARs and attack capabilities, we manage to inject spoofing point cloud with desired point cloud shapes into the victim LiDAR physically. We can launch four types of attacks, i.e., naive hiding, record-based creating, optimization-based hiding, and optimization-based creating. Extensive experiments demonstrate the effectiveness of our attacks against two commercial LiDAR and three detectors. We also discuss defense strategies at the sensor and AV system levels.
自动驾驶汽车和机器人越来越多地利用基于激光雷达的3D物体检测系统来检测环境中的障碍物。正确的检测和分类对于确保安全驾驶至关重要。虽然现有的工作已经证明了操纵点云来欺骗3D目标探测器的可行性,但大多数尝试都是数字化的。在本文中,我们研究了通过使用激光注入对抗性点云来物理欺骗基于lidar的3D目标检测的可能性。首先,我们开发了一种激光收发器,可以注入多达4200个点,这是以前工作的20倍,并且可以测量受害激光雷达的扫描周期来调度欺骗激光信号。通过设计一种将点云坐标转换为控制信号的控制信号方法和一种结合激光雷达物理约束和攻击能力的对抗性点云优化方法,我们成功地将具有所需点云形状的欺骗点云物理注入到受害激光雷达中。我们可以发起四种类型的攻击,即:朴素隐藏、基于记录的创建、基于优化的隐藏和基于优化的创建。大量的实验证明了我们的攻击对两个商用激光雷达和三个探测器的有效性。我们还讨论了传感器和AV系统级别的防御策略。
{"title":"PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle","authors":"Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu","doi":"10.1109/SP46215.2023.10179458","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179458","url":null,"abstract":"Autonomous vehicles and robots increasingly exploit LiDAR-based 3D object detection systems to detect obstacles in environment. Correct detection and classification are important to ensure safe driving. Though existing work has demonstrated the feasibility of manipulating point clouds to spoof 3D object detectors, most of the attempts are conducted digitally. In this paper, we investigate the possibility of physically fooling LiDAR-based 3D object detection by injecting adversarial point clouds using lasers. First, we develop a laser transceiver that can inject up to 4200 points, which is 20 times more than prior work, and can measure the scanning cycle of victim LiDARs to schedule the spoofing laser signals. By designing a control signal method that converts the coordinates of point clouds to control signals and an adversarial point cloud optimization method with physical constraints of LiDARs and attack capabilities, we manage to inject spoofing point cloud with desired point cloud shapes into the victim LiDAR physically. We can launch four types of attacks, i.e., naive hiding, record-based creating, optimization-based hiding, and optimization-based creating. Extensive experiments demonstrate the effectiveness of our attacks against two commercial LiDAR and three detectors. We also discuss defense strategies at the sensor and AV system levels.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ViDeZZo: Dependency-aware Virtual Device Fuzzing ViDeZZo:依赖感知虚拟设备模糊测试
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179354
Qiang Liu, Flavio Toffalini, Yajin Zhou, Mathias Payer
A virtual machine interacts with its host environment through virtual devices, driven by virtual device messages, e.g., I/O operations. By issuing crafted messages, an adversary can exploit a vulnerability in a virtual device to escape the virtual machine, gaining host access. Even though hundreds of bugs in virtual devices have been discovered, coverage-based virtual device fuzzers hardly consider intra-message dependencies (a field in a virtual device message may be dependent on another field) and inter-message dependencies (a message may depend on a previously issued message), thus resulting in limited scalability or efficiency.ViDeZZo, our new dependency-aware fuzzing framework for virtual devices, overcomes the limitations of existing virtual device fuzzers by annotating intra-message dependencies with a lightweight grammar, and by self-learning inter-message dependencies with new mutation rules. Specifically, ViDeZZo annotates message dependencies and applies three categories of message mutators. This approach avoids heavy manual effort to analyze specifications and speeds up the slow exploration by satisfying dependencies, resulting in a scalable and efficient fuzzer that boosts bug discovery in virtual devices.In our evaluation, ViDeZZo covers two hypervisors, four architectures, five device categories, and 28 virtual devices, and reaches competitive coverage faster. Moreover, ViDeZZo successfully finds 24 existing and 28 new bugs across diverse bug types. We are actively engaging with the community with 7 of our submitted patches already accepted.
虚拟机通过虚拟设备与主机环境交互,由虚拟设备消息驱动,例如I/O操作。通过发布精心制作的消息,攻击者可以利用虚拟设备中的漏洞逃离虚拟机,获得主机访问权限。尽管已经发现了虚拟设备中的数百个错误,但基于覆盖率的虚拟设备模糊器几乎没有考虑消息内依赖关系(虚拟设备消息中的一个字段可能依赖于另一个字段)和消息间依赖关系(消息可能依赖于先前发布的消息),因此导致可伸缩性或效率有限。ViDeZZo,我们新的虚拟设备依赖感知模糊测试框架,克服了现有虚拟设备模糊测试的局限性,通过轻量级语法注释消息内依赖,并通过新的突变规则自学习消息间依赖。具体来说,ViDeZZo注释了消息依赖关系,并应用了三类消息mutator。这种方法避免了大量的手工工作来分析规范,并通过满足依赖关系来加速缓慢的探索,从而产生了一个可扩展且高效的模糊器,可以促进虚拟设备中的漏洞发现。在我们的评估中,ViDeZZo涵盖了两个管理程序、四种架构、五种设备类别和28个虚拟设备,并且更快地达到了具有竞争力的覆盖范围。此外,ViDeZZo在不同的bug类型中成功地发现了24个现有的bug和28个新的bug。我们正在积极与社区互动,我们提交的7个补丁已经被接受。
{"title":"ViDeZZo: Dependency-aware Virtual Device Fuzzing","authors":"Qiang Liu, Flavio Toffalini, Yajin Zhou, Mathias Payer","doi":"10.1109/SP46215.2023.10179354","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179354","url":null,"abstract":"A virtual machine interacts with its host environment through virtual devices, driven by virtual device messages, e.g., I/O operations. By issuing crafted messages, an adversary can exploit a vulnerability in a virtual device to escape the virtual machine, gaining host access. Even though hundreds of bugs in virtual devices have been discovered, coverage-based virtual device fuzzers hardly consider intra-message dependencies (a field in a virtual device message may be dependent on another field) and inter-message dependencies (a message may depend on a previously issued message), thus resulting in limited scalability or efficiency.ViDeZZo, our new dependency-aware fuzzing framework for virtual devices, overcomes the limitations of existing virtual device fuzzers by annotating intra-message dependencies with a lightweight grammar, and by self-learning inter-message dependencies with new mutation rules. Specifically, ViDeZZo annotates message dependencies and applies three categories of message mutators. This approach avoids heavy manual effort to analyze specifications and speeds up the slow exploration by satisfying dependencies, resulting in a scalable and efficient fuzzer that boosts bug discovery in virtual devices.In our evaluation, ViDeZZo covers two hypervisors, four architectures, five device categories, and 28 virtual devices, and reaches competitive coverage faster. Moreover, ViDeZZo successfully finds 24 existing and 28 new bugs across diverse bug types. We are actively engaging with the community with 7 of our submitted patches already accepted.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"58 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Typing High-Speed Cryptography against Spectre v1 对Spectre v1进行高速加密
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179418
B. Shivakumar, G. Barthe, B. Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, P. Schwabe, Lucas Tabary-Maujean
The current gold standard of cryptographic software is to write efficient libraries with systematic protections against timing attacks. In order to meet this goal, cryptographic engineers increasingly use high-assurance cryptography tools. These tools guide programmers and provide rigorous guarantees that can be verified independently by library users. However, high-assurance tools reason about overly simple execution models that elide transient execution leakage. Thus, implementations validated by high-assurance cryptography tools remain potentially vulnerable to transient execution attacks such as Spectre or Meltdown. Moreover, proposed countermeasures are not used in practice due to performance overhead.We propose, analyze, implement and evaluate an approach for writing efficient cryptographic implementations that are protected against Spectre v1 attacks. Our approach ensures speculative constant-time, an information flow property which guarantees that programs are protected against Spectre v1. Speculative constant-time is enforced by means of a (value-dependent) information flow type system. The type system tracks security levels depending on whether execution is misspeculating. We implement our approach in the Jasmin framework for high-assurance cryptography, and use it for protecting all implementations of an experimental cryptographic library that includes highly optimized implementations of symmetric primitives, of elliptic-curve cryptography, and of Kyber, a lattice-based KEM recently selected by NIST for standardization. The performance impact of our protections is very low; for example, less than 1% for Kyber and essentially zero for X25519.
当前加密软件的黄金标准是编写具有系统保护的高效库,以防止定时攻击。为了实现这一目标,密码学工程师越来越多地使用高保证的密码学工具。这些工具指导程序员,并提供严格的保证,这些保证可以由库用户独立验证。然而,高保证工具的原因是过于简单的执行模型忽略了瞬态执行泄漏。因此,通过高保证加密工具验证的实现仍然可能容易受到瞬态执行攻击,如Spectre或Meltdown。此外,由于性能开销,所提出的对策并未在实践中使用。我们提出、分析、实现和评估了一种编写有效的加密实现的方法,该方法可以防止Spectre v1攻击。我们的方法确保了推测的恒定时间,这是一种信息流属性,可以保证程序免受Spectre v1的攻击。投机常数时间是通过(依赖于值的)信息流类型系统来实现的。类型系统根据执行是否错误推测来跟踪安全级别。我们在Jasmin框架中实现了我们的方法,用于高保证密码学,并使用它来保护实验密码学库的所有实现,该库包括对称原语、椭圆曲线密码学和Kyber的高度优化实现,Kyber是NIST最近选择用于标准化的基于格子的KEM。我们的保护对性能的影响非常低;例如,Kyber不到1%,X25519基本为零。
{"title":"Typing High-Speed Cryptography against Spectre v1","authors":"B. Shivakumar, G. Barthe, B. Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, P. Schwabe, Lucas Tabary-Maujean","doi":"10.1109/SP46215.2023.10179418","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179418","url":null,"abstract":"The current gold standard of cryptographic software is to write efficient libraries with systematic protections against timing attacks. In order to meet this goal, cryptographic engineers increasingly use high-assurance cryptography tools. These tools guide programmers and provide rigorous guarantees that can be verified independently by library users. However, high-assurance tools reason about overly simple execution models that elide transient execution leakage. Thus, implementations validated by high-assurance cryptography tools remain potentially vulnerable to transient execution attacks such as Spectre or Meltdown. Moreover, proposed countermeasures are not used in practice due to performance overhead.We propose, analyze, implement and evaluate an approach for writing efficient cryptographic implementations that are protected against Spectre v1 attacks. Our approach ensures speculative constant-time, an information flow property which guarantees that programs are protected against Spectre v1. Speculative constant-time is enforced by means of a (value-dependent) information flow type system. The type system tracks security levels depending on whether execution is misspeculating. We implement our approach in the Jasmin framework for high-assurance cryptography, and use it for protecting all implementations of an experimental cryptographic library that includes highly optimized implementations of symmetric primitives, of elliptic-curve cryptography, and of Kyber, a lattice-based KEM recently selected by NIST for standardization. The performance impact of our protections is very low; for example, less than 1% for Kyber and essentially zero for X25519.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130446729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Public Verification for Private Hash Matching 私有哈希匹配的公共验证
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179349
Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer
End-to-end encryption (E2EE) prevents online services from accessing user content. This important security property is also an obstacle for content moderation methods that involve content analysis. The tension between E2EE and efforts to combat child sexual abuse material (CSAM) has become a global flashpoint in encryption policy, because the predominant method of detecting harmful content—server-side perceptual hash matching on plaintext images—is unavailable.Recent applied cryptography advances enable private hash matching (PHM), where a service can match user content against a set of known CSAM images without revealing the hash set to users or nonmatching content to the service. These designs, especially a 2021 proposal for identifying CSAM in Apple’s iCloud Photos service, have attracted widespread criticism for creating risks to security, privacy, and free expression.In this work, we aim to advance scholarship and dialogue about PHM by contributing new cryptographic methods for system verification by the general public. We begin with motivation, describing the rationale for PHM to detect CSAM and the serious societal and technical issues with its deployment. Verification could partially address shortcomings of PHM, and we systematize critiques into two areas for auditing: trust in the hash set and trust in the implementation. We explain how, while these two issues cannot be fully resolved by technology alone, there are possible cryptographic trust improvements.The central contributions of this paper are novel cryptographic protocols that enable three types of public verification for PHM systems: (1) certification that external groups approve the hash set, (2) proof that particular lawful content is not in the hash set, and (3) eventual notification to users of false positive matches. The protocols that we describe are practical, efficient, and compatible with existing PHM constructions.
端到端加密(E2EE)可以防止在线服务访问用户内容。这个重要的安全属性也是涉及内容分析的内容审核方法的一个障碍。E2EE和打击儿童性虐待材料(CSAM)之间的紧张关系已经成为加密政策中的一个全球爆发点,因为检测有害内容的主要方法——对明文图像进行服务器端感知哈希匹配——是不可用的。最近应用的加密技术进步支持私有哈希匹配(PHM),其中服务可以根据一组已知的CSAM图像匹配用户内容,而不会向用户透露哈希集或向服务透露不匹配的内容。这些设计,尤其是2021年在苹果iCloud照片服务中识别CSAM的提议,因给安全、隐私和言论自由带来风险而受到广泛批评。在这项工作中,我们的目标是通过为公众提供新的系统验证密码方法来促进关于PHM的学术研究和对话。我们从动机开始,描述PHM检测CSAM的基本原理以及其部署的严重社会和技术问题。验证可以部分地解决PHM的缺点,我们将批评系统化地分为两个领域进行审计:对哈希集的信任和对实现的信任。虽然这两个问题不能单独通过技术完全解决,但我们解释了如何改进加密信任。本文的核心贡献是新颖的加密协议,它为PHM系统提供了三种类型的公共验证:(1)外部组批准哈希集的认证,(2)证明特定的合法内容不在哈希集中,以及(3)最终通知用户误报匹配。我们描述的协议是实用的、高效的,并且与现有的PHM结构兼容。
{"title":"Public Verification for Private Hash Matching","authors":"Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer","doi":"10.1109/SP46215.2023.10179349","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179349","url":null,"abstract":"End-to-end encryption (E2EE) prevents online services from accessing user content. This important security property is also an obstacle for content moderation methods that involve content analysis. The tension between E2EE and efforts to combat child sexual abuse material (CSAM) has become a global flashpoint in encryption policy, because the predominant method of detecting harmful content—server-side perceptual hash matching on plaintext images—is unavailable.Recent applied cryptography advances enable private hash matching (PHM), where a service can match user content against a set of known CSAM images without revealing the hash set to users or nonmatching content to the service. These designs, especially a 2021 proposal for identifying CSAM in Apple’s iCloud Photos service, have attracted widespread criticism for creating risks to security, privacy, and free expression.In this work, we aim to advance scholarship and dialogue about PHM by contributing new cryptographic methods for system verification by the general public. We begin with motivation, describing the rationale for PHM to detect CSAM and the serious societal and technical issues with its deployment. Verification could partially address shortcomings of PHM, and we systematize critiques into two areas for auditing: trust in the hash set and trust in the implementation. We explain how, while these two issues cannot be fully resolved by technology alone, there are possible cryptographic trust improvements.The central contributions of this paper are novel cryptographic protocols that enable three types of public verification for PHM systems: (1) certification that external groups approve the hash set, (2) proof that particular lawful content is not in the hash set, and (3) eventual notification to users of false positive matches. The protocols that we describe are practical, efficient, and compatible with existing PHM constructions.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Telepath: A Minecraft-based Covert Communication System 心灵感应:基于《我的世界》的隐蔽通信系统
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179335
Zhen Sun, Vitaly Shmatikov
Covert, censorship-resistant communication in the presence of nation-state adversaries requires unobservable channels whose operation is difficult to detect via network-traffic analysis. Traffic substitution, i.e., replacing data transmitted by a "cover" application with covert content, takes advantage of already-existing encrypted channels to produce traffic that is statistically indistinguishable from the traffic of the cover application and thus difficult to censor.Online games are a promising platform for building circumvention channels due to their popularity in many censored regions. We show, however, that previously proposed traffic substitution methods cannot be directly applied to games. Their traces, even if statistically similar to game traces, may violate game-specific invariants and are thus easy to detect because they could not have been generated by an actual gameplay.We explain how to identify non-disruptive content whose substitution does not result in client-server inconsistencies and use these ideas to design and implement Telepath, a covert communication system that uses Minecraft as the platform. Telepath takes advantage of (1) Minecraft’s encrypted client-server channel, (2) decentralized architecture that enables individual users to run their own servers, and (3) popularity of "mods" that add functionality to Minecraft clients and servers. Telepath runs a Minecraft game but substitutes non-disruptive in-game messages with covert content, without changing the game’s interaction with the network manager.We measure performance of Telepath for Web browsing and audio streaming, and show that network traffic generated by Telepath resists statistical traffic analysis that aims to distinguish it from popular Minecraft bots.
在存在民族国家对手的情况下,隐蔽的、抗审查的通信需要不可观察的通道,其操作很难通过网络流量分析检测到。流量替代,即用隐蔽内容替换“掩护”应用程序传输的数据,利用已经存在的加密通道产生与掩护应用程序的流量在统计上无法区分的流量,因此难以审查。由于网络游戏在许多审查地区很受欢迎,因此它是一个很有前途的建立规避渠道的平台。然而,我们表明,之前提出的流量替代方法不能直接应用于游戏。它们的轨迹,即使在统计上与游戏轨迹相似,也可能违反特定于游戏的不变量,因此很容易被检测到,因为它们不可能由实际的游戏玩法产生。我们解释了如何识别非破坏性内容,其替代不会导致客户端-服务器不一致,并使用这些想法来设计和实现Telepath,一个使用Minecraft作为平台的隐蔽通信系统。Telepath利用了(1)Minecraft的加密客户端-服务器通道,(2)分散架构,允许个人用户运行自己的服务器,以及(3)流行的“mod”,为Minecraft客户端和服务器添加功能。Telepath运行《我的世界》(Minecraft)游戏,但用隐蔽内容替代非破坏性的游戏内部信息,而不改变游戏与网络管理器的交互。我们测量了Telepath的Web浏览和音频流的性能,并表明Telepath产生的网络流量抵抗统计流量分析,旨在将其与流行的Minecraft机器人区分开来。
{"title":"Telepath: A Minecraft-based Covert Communication System","authors":"Zhen Sun, Vitaly Shmatikov","doi":"10.1109/SP46215.2023.10179335","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179335","url":null,"abstract":"Covert, censorship-resistant communication in the presence of nation-state adversaries requires unobservable channels whose operation is difficult to detect via network-traffic analysis. Traffic substitution, i.e., replacing data transmitted by a \"cover\" application with covert content, takes advantage of already-existing encrypted channels to produce traffic that is statistically indistinguishable from the traffic of the cover application and thus difficult to censor.Online games are a promising platform for building circumvention channels due to their popularity in many censored regions. We show, however, that previously proposed traffic substitution methods cannot be directly applied to games. Their traces, even if statistically similar to game traces, may violate game-specific invariants and are thus easy to detect because they could not have been generated by an actual gameplay.We explain how to identify non-disruptive content whose substitution does not result in client-server inconsistencies and use these ideas to design and implement Telepath, a covert communication system that uses Minecraft as the platform. Telepath takes advantage of (1) Minecraft’s encrypted client-server channel, (2) decentralized architecture that enables individual users to run their own servers, and (3) popularity of \"mods\" that add functionality to Minecraft clients and servers. Telepath runs a Minecraft game but substitutes non-disruptive in-game messages with covert content, without changing the game’s interaction with the network manager.We measure performance of Telepath for Web browsing and audio streaming, and show that network traffic generated by Telepath resists statistical traffic analysis that aims to distinguish it from popular Minecraft bots.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1