首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels 通过非接触式无线充电侧通道揭示智能手机上的用户交互
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179322
Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao
Today, there is an increasing number of smartphones supporting wireless charging that leverages electromagnetic induction to transmit power from a wireless charger to the charging smartphone. In this paper, we report a new contactless and context-aware wireless-charging side-channel attack, which captures two physical phenomena (i.e., the coil whine and the magnetic field perturbation) generated during this wireless charging process and further infers the user interactions on the charging smartphone. We design and implement a three-stage attack framework, dubbed WISERS, to demonstrate the practicality of this new side channel. WISERS first captures the coil whine and the magnetic field perturbation emitted by the wireless charger, then infers (i) inter-interface switches (e.g., switching from the home screen to an app interface) and (ii) intra-interface activities (e.g., keyboard inputs inside an app) to build user interaction contexts, and further reveals sensitive information. We extensively evaluate the effectiveness of WISERS with popular smartphones and commercial-off-the-shelf (COTS) wireless chargers. Our evaluation results suggest that WISERS can achieve over 90.4% accuracy in inferring sensitive information, such as screen-unlocking passcode and app launch. In addition, our study also shows that WISERS is resilient to a list of impact factors.
如今,越来越多的智能手机支持无线充电,利用电磁感应将电力从无线充电器传输到充电的智能手机。在本文中,我们报告了一种新的非接触式和上下文感知的无线充电侧信道攻击,该攻击捕获了无线充电过程中产生的两种物理现象(即线圈啸叫和磁场扰动),并进一步推断出充电智能手机上的用户交互。我们设计并实现了一个被称为WISERS的三阶段攻击框架,以证明这种新的侧信道的实用性。WISERS首先捕获线圈啸叫和无线充电器发出的磁场扰动,然后推断出(i)接口间切换(例如,从主屏幕切换到应用程序界面)和(ii)接口内活动(例如,应用程序内部的键盘输入),以构建用户交互上下文,并进一步揭示敏感信息。我们广泛评估WISERS与流行的智能手机和商用现货(COTS)无线充电器的有效性。我们的评估结果表明,WISERS在推断屏幕解锁密码和应用启动等敏感信息方面的准确率可以达到90.4%以上。此外,我们的研究还表明,WISERS对一系列影响因素具有弹性。
{"title":"Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels","authors":"Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao","doi":"10.1109/SP46215.2023.10179322","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179322","url":null,"abstract":"Today, there is an increasing number of smartphones supporting wireless charging that leverages electromagnetic induction to transmit power from a wireless charger to the charging smartphone. In this paper, we report a new contactless and context-aware wireless-charging side-channel attack, which captures two physical phenomena (i.e., the coil whine and the magnetic field perturbation) generated during this wireless charging process and further infers the user interactions on the charging smartphone. We design and implement a three-stage attack framework, dubbed WISERS, to demonstrate the practicality of this new side channel. WISERS first captures the coil whine and the magnetic field perturbation emitted by the wireless charger, then infers (i) inter-interface switches (e.g., switching from the home screen to an app interface) and (ii) intra-interface activities (e.g., keyboard inputs inside an app) to build user interaction contexts, and further reveals sensitive information. We extensively evaluate the effectiveness of WISERS with popular smartphones and commercial-off-the-shelf (COTS) wireless chargers. Our evaluation results suggest that WISERS can achieve over 90.4% accuracy in inferring sensitive information, such as screen-unlocking passcode and app launch. In addition, our study also shows that WISERS is resilient to a list of impact factors.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124505599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RuleKeeper: GDPR-Aware Personal Data Compliance for Web Frameworks RuleKeeper: Web框架的gdpr意识个人数据合规性
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179395
Mafalda Ferreira, Tiago Brito, J. Santos, Nuno Santos
Pressured by existing regulations such as the EU GDPR, online services must advertise a personal data protection policy declaring the types and purposes of collected personal data, which must then be strictly enforced as per the consent decisions made by the users. However, due to the lack of system-level support, obtaining strong guarantees of policy enforcement is hard, leaving the door open for software bugs and vulnerabilities to cause GDPR-compliance violations.We present RuleKeeper, a GDPR-aware personal data policy compliance system for web development frameworks. Currently ported for the MERN framework, RuleKeeper allows web developers to specify a GDPR manifest from which the data protection policy of the web application is automatically generated and is transparently enforced through static code analysis and runtime access control mechanisms. GDPR compliance is checked in a cross-cutting manner requiring few changes to the application code. We used our prototype implementation to evaluate RuleKeeper with four real-world applications. Our system can model realistic GDPR data protection requirements, adds modest performance overheads to the web application, and can detect GDPR violation bugs.
在欧盟GDPR等现有法规的压力下,在线服务必须宣传个人数据保护政策,声明收集个人数据的类型和目的,然后必须根据用户做出的同意决定严格执行。然而,由于缺乏系统级的支持,很难获得政策执行的有力保证,这就为软件漏洞和漏洞造成违反gdpr合规的行为敞开了大门。我们提出了RuleKeeper,一个基于gdpr的个人数据政策合规系统,用于web开发框架。目前为MERN框架移植,RuleKeeper允许web开发人员指定一个GDPR清单,从该清单中自动生成web应用程序的数据保护策略,并通过静态代码分析和运行时访问控制机制透明地执行。以横切方式检查GDPR合规性,只需对应用程序代码进行少量更改。我们使用原型实现用四个实际应用程序来评估RuleKeeper。我们的系统可以模拟现实的GDPR数据保护要求,为web应用程序增加适度的性能开销,并可以检测GDPR违规错误。
{"title":"RuleKeeper: GDPR-Aware Personal Data Compliance for Web Frameworks","authors":"Mafalda Ferreira, Tiago Brito, J. Santos, Nuno Santos","doi":"10.1109/SP46215.2023.10179395","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179395","url":null,"abstract":"Pressured by existing regulations such as the EU GDPR, online services must advertise a personal data protection policy declaring the types and purposes of collected personal data, which must then be strictly enforced as per the consent decisions made by the users. However, due to the lack of system-level support, obtaining strong guarantees of policy enforcement is hard, leaving the door open for software bugs and vulnerabilities to cause GDPR-compliance violations.We present RuleKeeper, a GDPR-aware personal data policy compliance system for web development frameworks. Currently ported for the MERN framework, RuleKeeper allows web developers to specify a GDPR manifest from which the data protection policy of the web application is automatically generated and is transparently enforced through static code analysis and runtime access control mechanisms. GDPR compliance is checked in a cross-cutting manner requiring few changes to the application code. We used our prototype implementation to evaluate RuleKeeper with four real-world applications. Our system can model realistic GDPR data protection requirements, adds modest performance overheads to the web application, and can detect GDPR violation bugs.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Breaking Security-Critical Voice Authentication 打破安全关键语音认证
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179374
Andre Kassis, U. Hengartner
Voice authentication (VA) has recently become an integral part in numerous security-critical operations, such as bank transactions and call center conversations. The vulnerability of automatic speaker verification systems (ASVs) to spoofing attacks instigated the development of countermeasures (CMs), whose task is to differentiate between bonafide and spoofed speech. Together, ASVs and CMs form today’s VA systems and are being advertised as an impregnable access control mechanism. We develop the first practical attack on spoofing countermeasures, and demonstrate how a malicious actor may efficiently craft audio samples against these defenses. Previous adversarial attacks against VA have been mainly designed for the whitebox scenario, which assumes knowledge of the system’s internals, or requires large query and time budgets to launch target-specific attacks. When attacking a security-critical system, these assumptions do not hold. Our attack, on the other hand, targets common points of failure that all spoofing countermeasures share, making it real-time, model-agnostic, and completely blackbox without the need to interact with the target to craft the attack samples. The key message from our work is that CMs mistakenly learn to distinguish between spoofed and bonafide audio based on cues that are easily identifiable and forgeable. The effects of our attack are subtle enough to guarantee that these adversarial samples can still bypass the ASV as well and preserve their original textual contents. These properties combined make for a powerful attack that can bypass security-critical VA in its strictest form, yielding success rates of up to 99% with only 6 attempts. Finally, we perform the first targeted, over-telephony-network attack on CMs, bypassing several known challenges and enabling a variety of potential threats, given the increased use of voice biometrics in call centers. Our results call into question the security of modern VA systems and urge users to rethink their trust in them, in light of the real threat of attackers bypassing these measures to gain access to their most valuable resources.
语音认证(VA)最近已成为许多安全关键操作中不可或缺的一部分,例如银行交易和呼叫中心会话。自动说话人验证系统(asv)对欺骗攻击的脆弱性促使了对抗措施(CMs)的发展,其任务是区分真实语音和欺骗语音。asv和CMs共同构成了今天的VA系统,并被宣传为一种坚不可摧的访问控制机制。我们开发了欺骗对策的第一个实际攻击,并演示了恶意行为者如何有效地制作音频样本来对抗这些防御。以前针对VA的对抗性攻击主要是为白盒场景设计的,它假设了解系统内部,或者需要大量的查询和时间预算来发起特定目标的攻击。在攻击安全关键型系统时,这些假设就不成立了。另一方面,我们的攻击针对所有欺骗对策共享的常见故障点,使其成为实时的,模型不可知的,并且完全黑盒,而无需与目标交互来制作攻击样本。从我们的工作中得到的关键信息是,CMs错误地学习区分欺骗和真实的音频,基于容易识别和伪造的线索。我们的攻击效果非常微妙,足以保证这些对抗性样本仍然可以绕过ASV并保留其原始文本内容。这些属性结合在一起构成了一种强大的攻击,可以绕过安全关键的最严格形式的VA,只需6次尝试就能获得高达99%的成功率。最后,我们对CMs进行了第一次有针对性的电话网络攻击,绕过了几个已知的挑战,并使各种潜在威胁成为可能,因为呼叫中心越来越多地使用语音生物识别技术。我们的研究结果对现代VA系统的安全性提出了质疑,并敦促用户重新考虑他们对这些系统的信任,因为攻击者会绕过这些措施获得他们最宝贵的资源。
{"title":"Breaking Security-Critical Voice Authentication","authors":"Andre Kassis, U. Hengartner","doi":"10.1109/SP46215.2023.10179374","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179374","url":null,"abstract":"Voice authentication (VA) has recently become an integral part in numerous security-critical operations, such as bank transactions and call center conversations. The vulnerability of automatic speaker verification systems (ASVs) to spoofing attacks instigated the development of countermeasures (CMs), whose task is to differentiate between bonafide and spoofed speech. Together, ASVs and CMs form today’s VA systems and are being advertised as an impregnable access control mechanism. We develop the first practical attack on spoofing countermeasures, and demonstrate how a malicious actor may efficiently craft audio samples against these defenses. Previous adversarial attacks against VA have been mainly designed for the whitebox scenario, which assumes knowledge of the system’s internals, or requires large query and time budgets to launch target-specific attacks. When attacking a security-critical system, these assumptions do not hold. Our attack, on the other hand, targets common points of failure that all spoofing countermeasures share, making it real-time, model-agnostic, and completely blackbox without the need to interact with the target to craft the attack samples. The key message from our work is that CMs mistakenly learn to distinguish between spoofed and bonafide audio based on cues that are easily identifiable and forgeable. The effects of our attack are subtle enough to guarantee that these adversarial samples can still bypass the ASV as well and preserve their original textual contents. These properties combined make for a powerful attack that can bypass security-critical VA in its strictest form, yielding success rates of up to 99% with only 6 attempts. Finally, we perform the first targeted, over-telephony-network attack on CMs, bypassing several known challenges and enabling a variety of potential threats, given the increased use of voice biometrics in call centers. Our results call into question the security of modern VA systems and urge users to rethink their trust in them, in light of the real threat of attackers bypassing these measures to gain access to their most valuable resources.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DevFuzz: Automatic Device Model-Guided Device Driver Fuzzing DevFuzz:自动设备模型导向的设备驱动模糊测试
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179293
Yilun Wu, Tong Zhang, Changhee Jung, Dongyoon Lee
The security of device drivers is critical for the entire operating system’s reliability. Yet, it remains very challenging to validate if a device driver can properly handle potentially malicious input from a hardware device. Unfortunately, existing symbolic execution-based solutions often do not scale, while fuzzing solutions require real devices or manual device models, leaving many device drivers under-tested and insecure.This paper presents DevFuzz, a new model-guided device driver fuzzing framework that does not require a physical device. DevFuzz uses symbolic execution to automatically generate the probe model that can guide a fuzzer to properly initialize a device driver under test. DevFuzz also leverages both static and dynamic program analyses to construct MMIO, PIO, and DMA device models to improve the effectiveness of fuzzing further. DevFuzz successfully tested 191 device drivers of various bus types (PCI, USB, RapidIO, I2C) from different operating systems (Linux, FreeBSD, and Windows) and detected 72 bugs, 41 of which have been patched and merged into the mainstream.
设备驱动程序的安全性对整个操作系统的可靠性至关重要。然而,验证设备驱动程序是否能够正确处理来自硬件设备的潜在恶意输入仍然非常具有挑战性。不幸的是,现有的基于符号执行的解决方案通常无法扩展,而模糊测试解决方案需要实际设备或手动设备模型,导致许多设备驱动程序未经过测试且不安全。本文提出了一种新的模型导向设备驱动模糊测试框架DevFuzz,它不需要物理设备。DevFuzz使用符号执行来自动生成探测模型,该模型可以指导fuzzer正确初始化被测设备驱动程序。DevFuzz还利用静态和动态程序分析来构建MMIO, PIO和DMA设备模型,以进一步提高模糊测试的有效性。DevFuzz在不同的操作系统(Linux、FreeBSD、Windows)上成功测试了191种不同总线类型(PCI、USB、RapidIO、I2C)的设备驱动程序,检测出72个bug,其中41个已经被修补并合并为主流。
{"title":"DevFuzz: Automatic Device Model-Guided Device Driver Fuzzing","authors":"Yilun Wu, Tong Zhang, Changhee Jung, Dongyoon Lee","doi":"10.1109/SP46215.2023.10179293","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179293","url":null,"abstract":"The security of device drivers is critical for the entire operating system’s reliability. Yet, it remains very challenging to validate if a device driver can properly handle potentially malicious input from a hardware device. Unfortunately, existing symbolic execution-based solutions often do not scale, while fuzzing solutions require real devices or manual device models, leaving many device drivers under-tested and insecure.This paper presents DevFuzz, a new model-guided device driver fuzzing framework that does not require a physical device. DevFuzz uses symbolic execution to automatically generate the probe model that can guide a fuzzer to properly initialize a device driver under test. DevFuzz also leverages both static and dynamic program analyses to construct MMIO, PIO, and DMA device models to improve the effectiveness of fuzzing further. DevFuzz successfully tested 191 device drivers of various bus types (PCI, USB, RapidIO, I2C) from different operating systems (Linux, FreeBSD, and Windows) and detected 72 bugs, 41 of which have been patched and merged into the mainstream.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129144900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones 蓝色是新的黑色(市场):隐私泄露和再次受害的警察拍卖手机
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179348
Richard Roberts, J. Poveda, Raley Roberts, Dave Levin
In the United States, items in police possession are often sold at auction if they are not claimed. This includes cellphones that the police obtained through civil asset forfeiture, that were stolen, or that were turned in to lost-and-found. Thousands of US police departments partner with a website, PropertyRoom, to auction their items. Over the course of several months, we purchased 228 cellphones from PropertyRoom to ascertain whether they contained personal information. Our results show that a shocking amount of sensitive, personal information is easily accessible, even to a "low-effort" adversary with no forensics expertise: 21.5% of the phones we purchased were not locked at all, another 4.8% used top-40 most common PINs and patterns, and one phone had a sticky-note from the police with the PIN on it. We analyze the content on the 61 phones we could access, finding sensitive information about not only the phones’ previous owners, but also about their personal contacts, and in some cases, about victims of those persons’ crimes. Additionally, we analyze approximately two years of PropertyRoom cellphone auctions, finding multiple instances of identifying information in photos of the items being auctioned, including sticky-notes with PINs, owners’ names and phone numbers, and evidence stickers that reveal how the phones were obtained and the names of the officers who obtained them. Our work shows that police procedures and phone auctions can be a significant source of personal information leakage and re-victimization. We hope that our work is a call to arms to enforce new policies that either prohibit the selling of computing devices containing user information, or at the very least impose requirements to wipe phones in a manner that the US federal government already employs.
在美国,警方持有的物品如果无人认领,通常会被拍卖。这包括警方通过没收民事财产获得的手机,被盗的手机,或者被交给失物招领处的手机。成千上万的美国警察部门与PropertyRoom网站合作,拍卖他们的物品。在几个月的时间里,我们从PropertyRoom购买了228部手机,以确定它们是否包含个人信息。我们的研究结果显示,大量敏感的个人信息很容易被获取,即使是没有取证专业知识的“低难度”对手也能轻易获取:我们购买的21.5%的手机根本没有上锁,另外4.8%的手机使用了前40名最常见的密码和模式,还有一部手机上贴着警方提供的密码贴纸。我们分析了可以访问的61部手机的内容,不仅找到了这些手机的前主人的敏感信息,还找到了他们的私人联系人,在某些情况下,还找到了这些人犯罪的受害者的敏感信息。此外,我们分析了PropertyRoom大约两年的手机拍卖,在拍卖物品的照片中发现了多个识别信息的实例,包括带有pin码、所有者姓名和电话号码的贴纸,以及显示手机获取方式和获取人员姓名的证据贴纸。我们的研究表明,警察程序和电话拍卖可能是个人信息泄露和再次受害的重要来源。我们希望我们的工作是对执行新政策的呼吁,这些政策要么禁止销售包含用户信息的计算设备,要么至少要求以美国联邦政府已经采用的方式清除手机数据。
{"title":"Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones","authors":"Richard Roberts, J. Poveda, Raley Roberts, Dave Levin","doi":"10.1109/SP46215.2023.10179348","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179348","url":null,"abstract":"In the United States, items in police possession are often sold at auction if they are not claimed. This includes cellphones that the police obtained through civil asset forfeiture, that were stolen, or that were turned in to lost-and-found. Thousands of US police departments partner with a website, PropertyRoom, to auction their items. Over the course of several months, we purchased 228 cellphones from PropertyRoom to ascertain whether they contained personal information. Our results show that a shocking amount of sensitive, personal information is easily accessible, even to a \"low-effort\" adversary with no forensics expertise: 21.5% of the phones we purchased were not locked at all, another 4.8% used top-40 most common PINs and patterns, and one phone had a sticky-note from the police with the PIN on it. We analyze the content on the 61 phones we could access, finding sensitive information about not only the phones’ previous owners, but also about their personal contacts, and in some cases, about victims of those persons’ crimes. Additionally, we analyze approximately two years of PropertyRoom cellphone auctions, finding multiple instances of identifying information in photos of the items being auctioned, including sticky-notes with PINs, owners’ names and phone numbers, and evidence stickers that reveal how the phones were obtained and the names of the officers who obtained them. Our work shows that police procedures and phone auctions can be a significant source of personal information leakage and re-victimization. We hope that our work is a call to arms to enforce new policies that either prohibit the selling of computing devices containing user information, or at the very least impose requirements to wipe phones in a manner that the US federal government already employs.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132163842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vectorized Batch Private Information Retrieval 矢量批处理私有信息检索
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179329
M. Mughees, Ling Ren
This paper studies Batch Private Information Retrieval (BatchPIR), a variant of private information retrieval (PIR) where the client wants to retrieve multiple entries from the server in one batch. BatchPIR matches the use case of many practical applications and holds the potential for substantial efficiency improvements over PIR in terms of amortized cost per query. Existing BatchPIR schemes have achieved decent computation efficiency but have not been able to improve communication efficiency at all. Using vectorized homomorphic encryption, we present the first BatchPIR protocol that is efficient in both computation and communication for a variety of database configurations. Specifically, to retrieve a batch of 256 entries from a database with one million entries of 256 bytes each, the communication cost of our scheme is 7.5x to 98.5x better than state-of-the-art solutions.
Batch Private Information Retrieval (BatchPIR)是私有信息检索(Private Information Retrieval, PIR)的一种变体,其中客户端希望一次批量地从服务器中检索多个条目。BatchPIR与许多实际应用程序的用例相匹配,并且在每个查询的平摊成本方面具有比PIR显著提高效率的潜力。现有的BatchPIR方案虽然取得了不错的计算效率,但根本无法提高通信效率。使用向量化同态加密,我们提出了第一个在各种数据库配置的计算和通信方面都很有效的BatchPIR协议。具体来说,要从数据库中检索一批256个条目,每个条目有一百万个条目,每个条目256字节,我们方案的通信成本比最先进的解决方案低7.5到98.5倍。
{"title":"Vectorized Batch Private Information Retrieval","authors":"M. Mughees, Ling Ren","doi":"10.1109/SP46215.2023.10179329","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179329","url":null,"abstract":"This paper studies Batch Private Information Retrieval (BatchPIR), a variant of private information retrieval (PIR) where the client wants to retrieve multiple entries from the server in one batch. BatchPIR matches the use case of many practical applications and holds the potential for substantial efficiency improvements over PIR in terms of amortized cost per query. Existing BatchPIR schemes have achieved decent computation efficiency but have not been able to improve communication efficiency at all. Using vectorized homomorphic encryption, we present the first BatchPIR protocol that is efficient in both computation and communication for a variety of database configurations. Specifically, to retrieve a batch of 256 entries from a database with one million entries of 256 bytes each, the communication cost of our scheme is 7.5x to 98.5x better than state-of-the-art solutions.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols 一个可扩展和精确生成混合MPC协议的框架
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179397
Edward Chen, Jinhao Zhu, Alex Ozdemir, R. Wahby, Fraser Brown, Wenting Zheng
Many applications in finance and healthcare need access to data from multiple organizations. While these organizations can benefit from computing on their joint datasets, they often cannot share data with each other due to regulatory constraints and business competition. One way mutually distrusting parties can collaborate without sharing their data in the clear is to use secure multiparty computation (MPC). However, MPC’s performance presents a serious obstacle for adoption as it is difficult for users who lack expertise in advanced cryptography to optimize. In this paper, we present Silph, a framework that can automatically compile a program written in a high-level language to an optimized, hybrid MPC protocol that mixes multiple MPC primitives securely and efficiently. Compared to prior works, our compilation speed is improved by up to 30000×. On various database analytics and machine learning workloads, the MPC protocols generated by Silph match or outperform prior work by up to 3.6×.
金融和医疗保健领域的许多应用程序需要访问来自多个组织的数据。虽然这些组织可以从联合数据集的计算中受益,但由于监管限制和商业竞争,它们通常无法相互共享数据。互不信任的各方在不公开共享数据的情况下进行协作的一种方法是使用安全多方计算(MPC)。然而,MPC的性能给采用带来了严重的障碍,因为缺乏高级密码学专业知识的用户很难对其进行优化。在本文中,我们提出了一个框架Silph,它可以自动将用高级语言编写的程序编译为优化的混合MPC协议,该协议安全有效地混合了多个MPC原语。与以前的工作相比,我们的编译速度提高了30000x。在各种数据库分析和机器学习工作负载上,由Silph生成的MPC协议达到或超过先前工作的3.6倍。
{"title":"Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols","authors":"Edward Chen, Jinhao Zhu, Alex Ozdemir, R. Wahby, Fraser Brown, Wenting Zheng","doi":"10.1109/SP46215.2023.10179397","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179397","url":null,"abstract":"Many applications in finance and healthcare need access to data from multiple organizations. While these organizations can benefit from computing on their joint datasets, they often cannot share data with each other due to regulatory constraints and business competition. One way mutually distrusting parties can collaborate without sharing their data in the clear is to use secure multiparty computation (MPC). However, MPC’s performance presents a serious obstacle for adoption as it is difficult for users who lack expertise in advanced cryptography to optimize. In this paper, we present Silph, a framework that can automatically compile a program written in a high-level language to an optimized, hybrid MPC protocol that mixes multiple MPC primitives securely and efficiently. Compared to prior works, our compilation speed is improved by up to 30000×. On various database analytics and machine learning workloads, the MPC protocols generated by Silph match or outperform prior work by up to 3.6×.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130897050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging 密码学的可否认性是否足够——非专家对安全信息中可否认性的认知
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179361
Nathan Reitinger, Nathan Malkin, Omer Akgul, Michelle L. Mazurek, Ian Miers
Cryptographers have long been concerned with secure messaging protocols threatening deniability. Many messaging protocols—including, surprisingly, modern email— contain digital signatures which definitively tie the author to their message. If stolen or leaked, these signatures make it impossible to deny authorship. As illustrated by events surrounding leaks from Hilary Clinton’s 2016 U.S. presidential campaign, this concern has proven well founded. Deniable protocols are meant to avoid this very outcome, letting politicians and dissidents alike safely disavow authorship. Despite being deployed on billions of devices in Signal and WhatsApp, the effectiveness of such protocols in convincing people remains unstudied. While the absence of cryptographic evidence is clearly necessary for an effective denial, is it sufficientƒWe conduct a survey study (n = 1, 200) to understand how people perceive evidence of deniability related to encrypted messaging protocols. Surprisingly, in a world of "fake news" and Photoshop, we find that simple denials of message authorship, when presented in a courtroom setting without supporting evidence, are not effective. In contrast, participants who were given access to a screenshot forgery tool or even told one exists were much more likely to believe a denial. Similarly, but to a lesser degree, we find an expert cryptographer’s assertion that there is no evidence is also effective.
密码学家长期以来一直关注威胁可否认性的安全消息传递协议。许多消息传递协议——令人惊讶的是,包括现代电子邮件——都包含数字签名,这些签名将作者与他们的消息明确地联系在一起。如果被盗或泄露,这些签名使其无法否认作者身份。正如希拉里·克林顿(hillary Clinton) 2016年美国总统竞选泄密事件所表明的那样,这种担忧被证明是有根据的。可否认协议旨在避免这种结果,让政治家和持不同政见者都可以安全地否认作者身份。尽管在Signal和WhatsApp上部署了数十亿台设备,但这些协议在说服人们方面的有效性仍未得到研究。虽然缺乏加密证据显然是有效拒绝的必要条件,但它是sufficientƒWe进行一项调查研究(n = 1200),以了解人们如何看待与加密消息协议相关的拒绝证据。令人惊讶的是,在一个充斥着“假新闻”和ps的世界里,我们发现,在没有证据支持的法庭环境下,简单地否认信息作者是无效的。相比之下,那些被允许使用截图伪造工具或甚至被告知存在截图伪造工具的参与者更有可能相信否认。类似地,但程度较轻的是,我们发现密码学专家断言没有证据也是有效的。
{"title":"Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging","authors":"Nathan Reitinger, Nathan Malkin, Omer Akgul, Michelle L. Mazurek, Ian Miers","doi":"10.1109/SP46215.2023.10179361","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179361","url":null,"abstract":"Cryptographers have long been concerned with secure messaging protocols threatening deniability. Many messaging protocols—including, surprisingly, modern email— contain digital signatures which definitively tie the author to their message. If stolen or leaked, these signatures make it impossible to deny authorship. As illustrated by events surrounding leaks from Hilary Clinton’s 2016 U.S. presidential campaign, this concern has proven well founded. Deniable protocols are meant to avoid this very outcome, letting politicians and dissidents alike safely disavow authorship. Despite being deployed on billions of devices in Signal and WhatsApp, the effectiveness of such protocols in convincing people remains unstudied. While the absence of cryptographic evidence is clearly necessary for an effective denial, is it sufficientƒWe conduct a survey study (n = 1, 200) to understand how people perceive evidence of deniability related to encrypted messaging protocols. Surprisingly, in a world of \"fake news\" and Photoshop, we find that simple denials of message authorship, when presented in a courtroom setting without supporting evidence, are not effective. In contrast, participants who were given access to a screenshot forgery tool or even told one exists were much more likely to believe a denial. Similarly, but to a lesser degree, we find an expert cryptographer’s assertion that there is no evidence is also effective.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms 你能用沥青坑清理互联网吗?探讨网络蠕虫攻击的可行性
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179467
H. Griffioen, C. Doerr
Botnets often spread through massive Internet-wide scanning, identifying and infecting vulnerable Internet-facing devices to grow their network. Taking down these networks is often hard for law enforcement, and some people have proposed tarpits as a defensive method because it does not require seizing infrastructure or rely on device owners to make sure their devices are well-configured and protected. These tarpits are network services that aim to keep a malware-infected device busy and slow down or eradicate the malicious behavior.This paper identifies a network-based tarpit vulnerability in stateless-scanning malware and develops a tarpitting exploit. We apply this technique against malware based on the Mirai scanning routine to identify whether tarpitting at scale is effective in containing the spread of self-propagating malware. We demonstrate that we can effectively trap thousands of devices even in a single tarpit and that this significantly slows down botnet spreading across the Internet and provide a framework to simulate malware spreading under various network conditions to apriori evaluate the effect of tarpits on a particular malware. We show that the self-propagating malware could be contained with the help of a few thousand tarpits without any measurable adverse impact on compromised routers or Internet Service Providers, and we release our tarpitting solution as an open platform to the community to realize this.
僵尸网络通常通过大规模的互联网扫描来传播,识别和感染易受攻击的面向互联网的设备,以扩大其网络。对于执法部门来说,关闭这些网络通常很困难,有些人建议将网络拦截作为一种防御方法,因为它不需要占用基础设施,也不依赖于设备所有者确保他们的设备配置良好并受到保护。这些tarpit是一种网络服务,旨在使受恶意软件感染的设备保持繁忙状态,并减缓或根除恶意行为。本文在无状态扫描恶意软件中发现了一个基于网络的攻击漏洞,并开发了一个攻击漏洞。我们将此技术应用于基于Mirai扫描例程的恶意软件,以确定大规模攻击是否有效地遏制了自传播恶意软件的传播。我们证明,即使在单个tarpit中,我们也可以有效地捕获数千台设备,这大大减缓了僵尸网络在互联网上的传播,并提供了一个框架来模拟恶意软件在各种网络条件下的传播,以先验地评估tarpit对特定恶意软件的影响。我们表明,自我传播的恶意软件可以在几千个tarpit的帮助下被遏制,而不会对受损的路由器或互联网服务提供商产生任何可测量的不利影响,并且我们将我们的tarpit解决方案作为一个开放平台发布给社区来实现这一点。
{"title":"Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms","authors":"H. Griffioen, C. Doerr","doi":"10.1109/SP46215.2023.10179467","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179467","url":null,"abstract":"Botnets often spread through massive Internet-wide scanning, identifying and infecting vulnerable Internet-facing devices to grow their network. Taking down these networks is often hard for law enforcement, and some people have proposed tarpits as a defensive method because it does not require seizing infrastructure or rely on device owners to make sure their devices are well-configured and protected. These tarpits are network services that aim to keep a malware-infected device busy and slow down or eradicate the malicious behavior.This paper identifies a network-based tarpit vulnerability in stateless-scanning malware and develops a tarpitting exploit. We apply this technique against malware based on the Mirai scanning routine to identify whether tarpitting at scale is effective in containing the spread of self-propagating malware. We demonstrate that we can effectively trap thousands of devices even in a single tarpit and that this significantly slows down botnet spreading across the Internet and provide a framework to simulate malware spreading under various network conditions to apriori evaluate the effect of tarpits on a particular malware. We show that the self-propagating malware could be contained with the help of a few thousand tarpits without any measurable adverse impact on compromised routers or Internet Service Providers, and we release our tarpitting solution as an open platform to the community to realize this.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116042747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations BLEDiff: BLE实现的可伸缩和属性不可知的不遵从性检查
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179330
Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, E. Bertino
In this work, we develop an automated, scalable, property-agnostic, and black-box protocol noncompliance checking framework called BLEDiff that can analyze and uncover noncompliant behavior in the Bluetooth Low Energy (BLE) protocol implementations. To overcome the enormous manual effort of extracting BLE protocol reference behavioral abstraction and security properties from a large and complex BLE specification, BLEDiff takes advantage of having access to multiple BLE devices and leverages the concept of differential testing to automatically identify deviant noncompliant behavior. In this regard, BLEDiff first automatically extracts the protocol FSM of a BLE implementation using the active automata learning approach. To improve the scalability of active automata learning for the large and complex BLE protocol, BLEDiff explores the idea of using a divide and conquer approach. BLEDiff essentially divides the BLE protocol into multiple sub-protocols, identifies their dependencies and extracts the FSM of each sub-protocol separately, and finally composes them to create the large protocol FSM. These FSMs are then pair-wise tested to automatically identify diverse deviations. We evaluate BLEDiff with 25 different commercial devices and demonstrate it can uncover 13 different deviant behaviors with 10 exploitable attacks.
在这项工作中,我们开发了一个自动化的、可扩展的、属性不可知的、黑盒协议不合规检查框架BLEDiff,它可以分析和发现蓝牙低功耗(BLE)协议实现中的不合规行为。为了克服从庞大而复杂的BLE规范中提取BLE协议参考行为抽象和安全属性的巨大手工工作量,BLEDiff利用了可以访问多个BLE设备的优势,并利用差分测试的概念来自动识别异常的不合规行为。在这方面,BLEDiff首先使用主动自动学习方法自动提取BLE实现的协议FSM。为了提高大型复杂BLE协议的主动自动机学习的可扩展性,BLEDiff探索了使用分而治之方法的想法。BLEDiff本质上是将BLE协议划分为多个子协议,识别它们之间的依赖关系,并分别提取每个子协议的FSM,最后将它们组合成一个大协议FSM。然后对这些fsm进行配对测试,以自动识别各种偏差。我们在25种不同的商业设备上评估了BLEDiff,并证明它可以发现13种不同的异常行为和10种可利用的攻击。
{"title":"BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations","authors":"Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, E. Bertino","doi":"10.1109/SP46215.2023.10179330","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179330","url":null,"abstract":"In this work, we develop an automated, scalable, property-agnostic, and black-box protocol noncompliance checking framework called BLEDiff that can analyze and uncover noncompliant behavior in the Bluetooth Low Energy (BLE) protocol implementations. To overcome the enormous manual effort of extracting BLE protocol reference behavioral abstraction and security properties from a large and complex BLE specification, BLEDiff takes advantage of having access to multiple BLE devices and leverages the concept of differential testing to automatically identify deviant noncompliant behavior. In this regard, BLEDiff first automatically extracts the protocol FSM of a BLE implementation using the active automata learning approach. To improve the scalability of active automata learning for the large and complex BLE protocol, BLEDiff explores the idea of using a divide and conquer approach. BLEDiff essentially divides the BLE protocol into multiple sub-protocols, identifies their dependencies and extracts the FSM of each sub-protocol separately, and finally composes them to create the large protocol FSM. These FSMs are then pair-wise tested to automatically identify diverse deviations. We evaluate BLEDiff with 25 different commercial devices and demonstrate it can uncover 13 different deviant behaviors with 10 exploitable attacks.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121212400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1