首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
SQUIP: Exploiting the Scheduler Queue Contention Side Channel SQUIP:利用调度程序队列争用侧通道
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179368
S. Gast, Jonas Juffinger, Martin Schwarzl, Gururaj Saileshwar, Andreas Kogler, Simone Franza, Markus Köstl, D. Gruss
Modern superscalar CPUs have multiple execution units that independently execute operations from the instruction stream. Previous work has shown that numerous side channels exist around these out-of-order execution pipelines, particularly for an attacker running on an SMT core.In this paper, we present the SQUIP attack, the first side-channel attack on scheduler queues, which are critical for deciding the schedule of instructions to be executed in superscalar CPUs. Scheduler queues have not been explored as a side channel so far, as Intel CPUs only have a single scheduler queue, and contention thereof would be virtually the same as contention of the reorder buffer. However, the Apple M1, AMD Zen 2, and Zen 3 microarchitectures have separate scheduler queues per execution unit. We first reverse-engineer the behavior of the scheduler queues on these CPUs and show that they can be primed and probed. The SQUIP attack observes the occupancy level from within the same hardware core and across SMT threads. We evaluate the performance of the SQUIP attack in a covert channel, exfiltrating 0.89 Mbit/s from a co-located virtual machine at an error rate below 0.8 %, and 2.70 Mbit/s from a co-located process at an error rate below 0.8 %. We then demonstrate the side channel on an mbedTLS RSA signature process in a co-located process and in a co-located virtual machine. Our attack recovers full RSA-4096 keys with only 50 500 traces and less than 5 to 18 bit errors on average. Finally, we discuss mitigations necessary, especially for Zen 2 and Zen 3 systems, to prevent our attacks.
现代的超标量cpu有多个执行单元,它们独立地执行指令流中的操作。以前的工作表明,在这些乱序执行管道周围存在许多侧通道,特别是对于在SMT核心上运行的攻击者。在本文中,我们提出了SQUIP攻击,这是针对调度程序队列的第一个侧信道攻击,它对决定在超标量cpu中执行的指令的调度至关重要。到目前为止,调度器队列还没有作为一个侧通道进行研究,因为Intel cpu只有一个调度器队列,其争用实际上与重排序缓冲区的争用相同。然而,Apple M1、AMD Zen 2和Zen 3微架构在每个执行单元上都有单独的调度器队列。我们首先对这些cpu上调度程序队列的行为进行逆向工程,并展示它们可以被启动和探测。SQUIP攻击从同一硬件核心内部和跨SMT线程观察占用级别。我们在隐蔽通道中评估了SQUIP攻击的性能,以低于0.8%的错误率从一个同址虚拟机中渗透0.89 Mbit/s,以低于0.8%的错误率从一个同址进程中渗透2.70 Mbit/s。然后,我们在一个共存的进程和一个共存的虚拟机中演示mbedTLS RSA签名进程上的侧信道。我们的攻击恢复完整的RSA-4096密钥,只有50 500个跟踪,平均误差小于5到18位。最后,我们讨论了必要的缓解措施,特别是对于Zen 2和Zen 3系统,以防止我们的攻击。
{"title":"SQUIP: Exploiting the Scheduler Queue Contention Side Channel","authors":"S. Gast, Jonas Juffinger, Martin Schwarzl, Gururaj Saileshwar, Andreas Kogler, Simone Franza, Markus Köstl, D. Gruss","doi":"10.1109/SP46215.2023.10179368","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179368","url":null,"abstract":"Modern superscalar CPUs have multiple execution units that independently execute operations from the instruction stream. Previous work has shown that numerous side channels exist around these out-of-order execution pipelines, particularly for an attacker running on an SMT core.In this paper, we present the SQUIP attack, the first side-channel attack on scheduler queues, which are critical for deciding the schedule of instructions to be executed in superscalar CPUs. Scheduler queues have not been explored as a side channel so far, as Intel CPUs only have a single scheduler queue, and contention thereof would be virtually the same as contention of the reorder buffer. However, the Apple M1, AMD Zen 2, and Zen 3 microarchitectures have separate scheduler queues per execution unit. We first reverse-engineer the behavior of the scheduler queues on these CPUs and show that they can be primed and probed. The SQUIP attack observes the occupancy level from within the same hardware core and across SMT threads. We evaluate the performance of the SQUIP attack in a covert channel, exfiltrating 0.89 Mbit/s from a co-located virtual machine at an error rate below 0.8 %, and 2.70 Mbit/s from a co-located process at an error rate below 0.8 %. We then demonstrate the side channel on an mbedTLS RSA signature process in a co-located process and in a co-located virtual machine. Our attack recovers full RSA-4096 keys with only 50 500 traces and less than 5 to 18 bit errors on average. Finally, we discuss mitigations necessary, especially for Zen 2 and Zen 3 systems, to prevent our attacks.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing SegFuzz:通过模糊测试对线程交错进行分段,以发现内核并发性错误
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179398
Dae R. Jeong, Byoungyoung Lee, I. Shin, Youngjin Kwon
Discovering kernel concurrency bugs through fuzzing is challenging. Identifying kernel concurrency bugs, as opposed to non-concurrency bugs, necessitates an analysis of possible interleavings between two or more threads. However, because the search space of thread interleaving is vast, it is impractical to investigate all conceivable thread interleavings. To explore the vast search space, most previous approaches perform random or simple heuristic searches without having coverage for thread interleaving or with an insufficient form of coverage. As a result, they either conduct wasteful searches with redundant executions or overlook concurrent bugs that their coverage cannot address.To overcome such limitations, we propose SegFuzz, a fuzzing framework for kernel concurrency bugs. When exploring the search space of thread interleavings, SegFuzz decomposes an entire thread interleaving into a set of segments, each of which represents an interleaving of the small number of instructions, and utilizes individual segments as interleaving coverage, called interleaving segment coverage. When searching for thread interleavings, SegFuzz mutates interleavings in explored interleaving segments to construct new thread interleavings that have not yet been explored. With SegFuzz, we discover new 21 concurrency bugs in Linux kernels, and demonstrate the efficiency of SegFuzz by showing that SegFuzz can identify known bugs on average 4.1 times quickly than the state-of-the-art approaches.
通过模糊测试发现内核并发性bug是具有挑战性的。识别内核并发性错误(而不是非并发性错误)需要分析两个或多个线程之间可能的交叉。然而,由于线程交织的搜索空间很大,要研究所有可能的线程交织是不现实的。为了探索巨大的搜索空间,大多数以前的方法执行随机或简单的启发式搜索,而没有覆盖线程交错或覆盖形式不足。结果,他们要么进行冗余执行的浪费搜索,要么忽略他们的覆盖范围无法解决的并发错误。为了克服这些限制,我们提出了SegFuzz,这是一个内核并发错误的模糊框架。在探索线程交错的搜索空间时,SegFuzz将整个线程交错分解为一组片段,每个片段代表少量指令的交错,并利用单个片段作为交错覆盖,称为交错段覆盖。当搜索线程交错时,SegFuzz改变已探索的交错段中的交错,以构建尚未探索的新线程交错。使用SegFuzz,我们在Linux内核中发现了21个新的并发错误,并通过显示SegFuzz识别已知错误的平均速度比最先进的方法快4.1倍来展示SegFuzz的效率。
{"title":"SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing","authors":"Dae R. Jeong, Byoungyoung Lee, I. Shin, Youngjin Kwon","doi":"10.1109/SP46215.2023.10179398","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179398","url":null,"abstract":"Discovering kernel concurrency bugs through fuzzing is challenging. Identifying kernel concurrency bugs, as opposed to non-concurrency bugs, necessitates an analysis of possible interleavings between two or more threads. However, because the search space of thread interleaving is vast, it is impractical to investigate all conceivable thread interleavings. To explore the vast search space, most previous approaches perform random or simple heuristic searches without having coverage for thread interleaving or with an insufficient form of coverage. As a result, they either conduct wasteful searches with redundant executions or overlook concurrent bugs that their coverage cannot address.To overcome such limitations, we propose SegFuzz, a fuzzing framework for kernel concurrency bugs. When exploring the search space of thread interleavings, SegFuzz decomposes an entire thread interleaving into a set of segments, each of which represents an interleaving of the small number of instructions, and utilizes individual segments as interleaving coverage, called interleaving segment coverage. When searching for thread interleavings, SegFuzz mutates interleavings in explored interleaving segments to construct new thread interleavings that have not yet been explored. With SegFuzz, we discover new 21 concurrency bugs in Linux kernels, and demonstrate the efficiency of SegFuzz by showing that SegFuzz can identify known bugs on average 4.1 times quickly than the state-of-the-art approaches.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blue’s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices 蓝色的线索:实际发现的不可发现的蓝牙设备
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179358
Tyler Tucker, Hunter Searle, Kevin R. B. Butler, Patrick Traynor
Bluetooth is overwhelmingly the protocol of choice for personal area networking, and the Bluetooth Classic standard has been in continuous use for over 20 years. Bluetooth devices make themselves Discoverable to communicate, but best practice to protect privacy is to ensure that devices remain in Non-Discoverable mode. This paper demonstrates the futility of protecting devices by making them Non-Discoverable. We introduce the Blue’s Clues attack, which presents the first direct, non-disruptive approach to fully extracting the permanent, unique Bluetooth MAC identifier from targeted devices in Non-Discoverable mode. We also demonstrate that we can fully characterize device capabilities and retrieve identifiers, some of which we discover often contain identifying information about the device owner. We demonstrate Blue’s Clues using a software-defined radio and mounting the attack over the air against both our own devices and, with institutional approval, throughout a public building. We find that a wide variety of Bluetooth devices can be uniquely identified in less than 10 seconds on average, with affected devices ranging from smartphones and headphones to gas pump skimmers and nanny-cams, spanning all versions of the Bluetooth Classic standard. While we provide potential mitigation against attacks, Blue’s Clues forces a reassessment of over 20 years of best practices for protecting devices against discovery.
蓝牙绝对是个人区域网络的首选协议,蓝牙经典标准已经连续使用了20多年。蓝牙设备使自己可发现以进行通信,但保护隐私的最佳实践是确保设备保持在非可发现模式。本文证明了通过使设备不可发现来保护设备是徒劳的。我们介绍了蓝色的线索攻击,它提出了第一个直接的,非破坏性的方法,以非发现模式从目标设备中完全提取永久的,唯一的蓝牙MAC标识符。我们还演示了我们可以完全描述设备功能和检索标识符,我们发现其中一些标识符通常包含有关设备所有者的标识信息。我们使用软件定义的无线电演示Blue 's Clues,并对我们自己的设备进行空中攻击,并在获得机构批准的情况下,在整个公共建筑中进行攻击。我们发现,各种各样的蓝牙设备平均可以在不到10秒的时间内被唯一识别,受影响的设备包括智能手机、耳机、油泵撇油器和保姆摄像头,涵盖了蓝牙经典标准的所有版本。虽然我们提供了潜在的攻击缓解措施,但Blue的线索迫使对20多年来保护设备免受发现的最佳实践进行重新评估。
{"title":"Blue’s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices","authors":"Tyler Tucker, Hunter Searle, Kevin R. B. Butler, Patrick Traynor","doi":"10.1109/SP46215.2023.10179358","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179358","url":null,"abstract":"Bluetooth is overwhelmingly the protocol of choice for personal area networking, and the Bluetooth Classic standard has been in continuous use for over 20 years. Bluetooth devices make themselves Discoverable to communicate, but best practice to protect privacy is to ensure that devices remain in Non-Discoverable mode. This paper demonstrates the futility of protecting devices by making them Non-Discoverable. We introduce the Blue’s Clues attack, which presents the first direct, non-disruptive approach to fully extracting the permanent, unique Bluetooth MAC identifier from targeted devices in Non-Discoverable mode. We also demonstrate that we can fully characterize device capabilities and retrieve identifiers, some of which we discover often contain identifying information about the device owner. We demonstrate Blue’s Clues using a software-defined radio and mounting the attack over the air against both our own devices and, with institutional approval, throughout a public building. We find that a wide variety of Bluetooth devices can be uniquely identified in less than 10 seconds on average, with affected devices ranging from smartphones and headphones to gas pump skimmers and nanny-cams, spanning all versions of the Bluetooth Classic standard. While we provide potential mitigation against attacks, Blue’s Clues forces a reassessment of over 20 years of best practices for protecting devices against discovery.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks 一石三鸟:对相互依赖的加密货币网络的有效分区攻击
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179456
Muhammad Saad, David A. Mohaisen
The biased distribution of cryptocurrency nodes across Autonomous Systems (ASes) increases the risk of spatial partitioning attacks, allowing an adversary to isolate nodes by hijacking AS prefixes. Prior works on spatial partitioning attacks have mainly focused on the Bitcoin network, showing that the prominent cryptocurrency network can be paralyzed by disrupting the physical topology through BGP hijacks.Despite the persisting threat of BGP hijacks, Bitcoin and other cryptocurrencies have not been frequently targeted, likely due to their shielded overlay topology, which limits the exposure of physical network anomalies. In this paper, we present a new perspective by examining the security of cryptocurrency networks, considering shared network resources (network interdependence). We conduct measurements extending beyond the Bitcoin network and analyze commonalities in Bitcoin, Ethereum, and Ripple node hosting patterns. We observe that all three networks are highly centralized, predominantly sharing the common ASes. We also note that among the three cryptocurrencies, Ripple does not shield its overlay topology, which can be exploited to learn about the physical network anomalies. The observed network anomalies present practical attack strategies that can be launched to target all three cryptocurrencies simultaneously. 1 We supplement our analysis by surveying recent BGP attacks on high-profile ASes and recognizing a need for application-level countermeasures. We propose attack countermeasures that reduce the risk of spatial partitioning, notwithstanding the increasing centralization of nodes and network interdependence.
跨自治系统(AS)的加密货币节点的偏差分布增加了空间分区攻击的风险,允许攻击者通过劫持AS前缀来隔离节点。先前关于空间分区攻击的工作主要集中在比特币网络上,表明通过BGP劫持破坏物理拓扑可以使突出的加密货币网络瘫痪。尽管BGP劫持的威胁持续存在,但比特币和其他加密货币并没有经常成为攻击目标,这可能是由于它们的屏蔽覆盖拓扑结构限制了物理网络异常的暴露。在本文中,我们通过考虑共享网络资源(网络相互依存)来研究加密货币网络的安全性,提出了一个新的视角。我们进行了超出比特币网络的测量,并分析了比特币、以太坊和Ripple节点托管模式的共性。我们观察到,这三个网络都是高度集中的,主要共享公共ase。我们还注意到,在三种加密货币中,Ripple不屏蔽其覆盖拓扑,这可以被利用来了解物理网络异常。观察到的网络异常提供了实用的攻击策略,可以同时针对所有三种加密货币发起攻击。我们通过调查最近针对高端ase的BGP攻击来补充我们的分析,并认识到需要应用级对策。我们提出了降低空间分区风险的攻击对策,尽管节点和网络的相互依赖性日益集中。
{"title":"Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks","authors":"Muhammad Saad, David A. Mohaisen","doi":"10.1109/SP46215.2023.10179456","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179456","url":null,"abstract":"The biased distribution of cryptocurrency nodes across Autonomous Systems (ASes) increases the risk of spatial partitioning attacks, allowing an adversary to isolate nodes by hijacking AS prefixes. Prior works on spatial partitioning attacks have mainly focused on the Bitcoin network, showing that the prominent cryptocurrency network can be paralyzed by disrupting the physical topology through BGP hijacks.Despite the persisting threat of BGP hijacks, Bitcoin and other cryptocurrencies have not been frequently targeted, likely due to their shielded overlay topology, which limits the exposure of physical network anomalies. In this paper, we present a new perspective by examining the security of cryptocurrency networks, considering shared network resources (network interdependence). We conduct measurements extending beyond the Bitcoin network and analyze commonalities in Bitcoin, Ethereum, and Ripple node hosting patterns. We observe that all three networks are highly centralized, predominantly sharing the common ASes. We also note that among the three cryptocurrencies, Ripple does not shield its overlay topology, which can be exploited to learn about the physical network anomalies. The observed network anomalies present practical attack strategies that can be launched to target all three cryptocurrencies simultaneously. 1 We supplement our analysis by surveying recent BGP attacks on high-profile ASes and recognizing a need for application-level countermeasures. We propose attack countermeasures that reduce the risk of spatial partitioning, notwithstanding the increasing centralization of nodes and network interdependence.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125778794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MPCAuth: Multi-factor Authentication for Distributed-trust Systems MPCAuth:分布式信任系统的多因素身份验证
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179481
Sijun Tan, Weikeng Chen, Ryan Deng, R. A. Popa
Systems with distributed trust have attracted growing research attention and seen increasing industry adoptions. In these systems, critical secrets are distributed across N servers, and computations are performed privately using secure multi-party computation (SMPC). Authentication for these distributed-trust systems faces two challenges. The first challenge is ease-of-use. Namely, how can an authentication protocol maintain its user experience without sacrificing security? To avoid a central point of attack, a client needs to authenticate to each server separately. However, this would require the client to authenticate N times for each authentication factor, which greatly hampers usability. The second challenge is privacy, as the client’s sensitive profiles are now exposed to all N servers under different trust domains, which creates N times the attack surface for the profile data.We present MPCAuth, a multi-factor authentication system for distributed-trust applications that address both challenges. Our system enables a client to authenticate to N servers independently with the work of only one authentication. In addition, our system is profile hiding, meaning that the client’s authentication profiles such as her email username, phone number, passwords, and biometric features are not revealed unless all servers are compromised. We propose secure and practical protocols for an array of widely adopted authentication factors, including email passcodes, SMS messages, U2F, security questions/passwords, and biometrics. Our system finds practical applications in the space of cryptocurrency custody and collaborative machine learning, and benefits future adoptions of distributed-trust applications.
分布式信任系统吸引了越来越多的研究关注,并被越来越多的行业所采用。在这些系统中,关键机密分布在 N 台服务器上,并使用安全多方计算(SMPC)进行私密计算。这些分布式信任系统的身份验证面临两个挑战。第一个挑战是易用性。也就是说,认证协议如何才能在不牺牲安全性的前提下保持用户体验?为了避免中心攻击点,客户端需要分别对每个服务器进行身份验证。然而,这就要求客户端对每个认证因素进行 N 次认证,从而大大影响了可用性。第二个挑战是隐私问题,因为客户端的敏感档案现在暴露在不同信任域下的所有 N 台服务器上,这就为档案数据创造了 N 倍的攻击面。我们的系统使客户端只需进行一次身份验证,就能对 N 台服务器进行独立身份验证。此外,我们的系统还具有配置文件隐藏功能,也就是说,除非所有服务器都遭到破坏,否则客户端的身份验证配置文件(如电子邮件用户名、电话号码、密码和生物特征)不会泄露。我们为一系列广泛采用的认证因素提出了安全实用的协议,包括电子邮件密码、短信、U2F、安全问题/密码和生物识别。我们的系统可实际应用于加密货币保管和协作机器学习领域,并有利于未来分布式信任应用的采用。
{"title":"MPCAuth: Multi-factor Authentication for Distributed-trust Systems","authors":"Sijun Tan, Weikeng Chen, Ryan Deng, R. A. Popa","doi":"10.1109/SP46215.2023.10179481","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179481","url":null,"abstract":"Systems with distributed trust have attracted growing research attention and seen increasing industry adoptions. In these systems, critical secrets are distributed across N servers, and computations are performed privately using secure multi-party computation (SMPC). Authentication for these distributed-trust systems faces two challenges. The first challenge is ease-of-use. Namely, how can an authentication protocol maintain its user experience without sacrificing security? To avoid a central point of attack, a client needs to authenticate to each server separately. However, this would require the client to authenticate N times for each authentication factor, which greatly hampers usability. The second challenge is privacy, as the client’s sensitive profiles are now exposed to all N servers under different trust domains, which creates N times the attack surface for the profile data.We present MPCAuth, a multi-factor authentication system for distributed-trust applications that address both challenges. Our system enables a client to authenticate to N servers independently with the work of only one authentication. In addition, our system is profile hiding, meaning that the client’s authentication profiles such as her email username, phone number, passwords, and biometric features are not revealed unless all servers are compromised. We propose secure and practical protocols for an array of widely adopted authentication factors, including email passcodes, SMS messages, U2F, security questions/passwords, and biometrics. Our system finds practical applications in the space of cryptocurrency custody and collaborative machine learning, and benefits future adoptions of distributed-trust applications.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130466900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MEGA: Malleable Encryption Goes Awry MEGA:可延展加密出错
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179290
Matilda Backendal, Miro Haller, Kenneth G. Paterson
MEGA is a leading cloud storage platform with more than 250 million users and 1000 Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is achieved by having all data encryption and decryption operations done on MEGA clients, under the control of keys that are only available to those clients. This is intended to protect MEGA users from attacks by MEGA itself, or by adversaries who have taken control of MEGA’s infrastructure.We provide a detailed analysis of MEGA’s use of cryptography in such a malicious server setting. We present five distinct attacks against MEGA, which together allow for a full compromise of the confidentiality of user files. Additionally, the integrity of user data is damaged to the extent that an attacker can insert malicious files of their choice which pass all authenticity checks of the client. We built proof-of-concept versions of all the attacks. Four of the five attacks are eminently practical. They have all been responsibly disclosed to MEGA and remediation is underway.Taken together, our attacks highlight significant shortcomings in MEGA’s cryptographic architecture. We present immediately deployable countermeasures, as well as longer-term recommendations. We also provide a broader discussion of the challenges of cryptographic deployment at massive scale under strong threat models.
MEGA是一个领先的云存储平台,拥有超过2.5亿用户和1000拍字节的存储数据。MEGA声称提供用户控制的端到端安全性。这是通过在MEGA客户端上完成所有数据加密和解密操作来实现的,这些操作是在仅对这些客户端可用的密钥的控制下完成的。这是为了保护MEGA用户免受MEGA自身或控制MEGA基础设施的对手的攻击。我们提供了MEGA在这种恶意服务器设置中使用加密技术的详细分析。我们提出了针对MEGA的五种不同的攻击,它们一起允许完全危及用户文件的机密性。此外,用户数据的完整性被破坏,以至于攻击者可以插入他们选择的恶意文件,这些文件可以通过客户端的所有真实性检查。我们构建了所有攻击的概念验证版本。五种攻击中有四种非常实用。已向MEGA负责任地披露,并正在进行整改。总的来说,我们的攻击突出了MEGA加密体系结构的重大缺陷。我们提出了可立即部署的对策,以及长期建议。我们还对强威胁模型下大规模加密部署的挑战进行了更广泛的讨论。
{"title":"MEGA: Malleable Encryption Goes Awry","authors":"Matilda Backendal, Miro Haller, Kenneth G. Paterson","doi":"10.1109/SP46215.2023.10179290","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179290","url":null,"abstract":"MEGA is a leading cloud storage platform with more than 250 million users and 1000 Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is achieved by having all data encryption and decryption operations done on MEGA clients, under the control of keys that are only available to those clients. This is intended to protect MEGA users from attacks by MEGA itself, or by adversaries who have taken control of MEGA’s infrastructure.We provide a detailed analysis of MEGA’s use of cryptography in such a malicious server setting. We present five distinct attacks against MEGA, which together allow for a full compromise of the confidentiality of user files. Additionally, the integrity of user data is damaged to the extent that an attacker can insert malicious files of their choice which pass all authenticity checks of the client. We built proof-of-concept versions of all the attacks. Four of the five attacks are eminently practical. They have all been responsibly disclosed to MEGA and remediation is underway.Taken together, our attacks highlight significant shortcomings in MEGA’s cryptographic architecture. We present immediately deployable countermeasures, as well as longer-term recommendations. We also provide a broader discussion of the challenges of cryptographic deployment at massive scale under strong threat models.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115030959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ELSA: Secure Aggregation for Federated Learning with Malicious Actors ELSA:针对恶意参与者的联邦学习的安全聚合
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179468
Mayank Rathee, Conghao Shen, Sameer Wagh, R. A. Popa
Federated learning (FL) is an increasingly popular approach for machine learning (ML) in cases where the training dataset is highly distributed. Clients perform local training on their datasets and the updates are then aggregated into the global model. Existing protocols for aggregation are either inefficient, or don’t consider the case of malicious actors in the system. This is a major barrier in making FL an ideal solution for privacy-sensitive ML applications. We present Elsa, a secure aggregation protocol for FL, which breaks this barrier - it is efficient and addresses the existence of malicious actors at the core of its design. Similar to prior work on Prio and Prio+, Elsa provides a novel secure aggregation protocol built out of distributed trust across two servers that keeps individual client updates private as long as one server is honest, defends against malicious clients, and is efficient end-to-end. Compared to prior works, the distinguishing theme in Elsa is that instead of the servers generating cryptographic correlations interactively, the clients act as untrusted dealers of these correlations without compromising the protocol’s security. This leads to a much faster protocol while also achieving stronger security at that efficiency compared to prior work. We introduce new techniques that retain privacy even when a server is malicious at a small added cost of 7-25% in runtime with negligible increase in communication over the case of semi-honest server. Our work improves end-to-end runtime over prior work with similar security guarantees by big margins - single-aggregator RoFL by up to 305x (for the models we consider), and distributed trust Prio by up to 8x.
在训练数据集高度分布的情况下,联邦学习(FL)是一种越来越流行的机器学习(ML)方法。客户端对他们的数据集进行本地训练,然后将更新汇总到全局模型中。现有的聚合协议要么效率低下,要么没有考虑系统中恶意参与者的情况。这是使FL成为隐私敏感的ML应用程序的理想解决方案的主要障碍。我们提出了Elsa,一个用于FL的安全聚合协议,它打破了这一障碍——它是有效的,并且在其设计的核心解决了恶意行为者的存在。与之前在Prio和Prio+上的工作类似,Elsa提供了一种基于跨两台服务器的分布式信任构建的新型安全聚合协议,只要一台服务器是诚实的,就可以保持单个客户端更新的私密性,防御恶意客户端,并且是高效的端到端。与以前的工作相比,Elsa的不同之处在于,它不是由服务器交互地生成加密关联,而是由客户端充当这些关联的不受信任的交易商,而不会损害协议的安全性。这导致了一个更快的协议,同时与之前的工作相比,在这种效率下也实现了更强的安全性。我们引入了新的技术,即使服务器是恶意的,也可以在运行时以7-25%的小成本增加隐私,而在半诚实服务器的情况下,通信的增加可以忽略不计。与之前的工作相比,我们的工作改进了端到端运行时,并提供了类似的安全保证——单聚合器RoFL提高了305倍(对于我们考虑的模型),分布式信任Prio提高了8倍。
{"title":"ELSA: Secure Aggregation for Federated Learning with Malicious Actors","authors":"Mayank Rathee, Conghao Shen, Sameer Wagh, R. A. Popa","doi":"10.1109/SP46215.2023.10179468","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179468","url":null,"abstract":"Federated learning (FL) is an increasingly popular approach for machine learning (ML) in cases where the training dataset is highly distributed. Clients perform local training on their datasets and the updates are then aggregated into the global model. Existing protocols for aggregation are either inefficient, or don’t consider the case of malicious actors in the system. This is a major barrier in making FL an ideal solution for privacy-sensitive ML applications. We present Elsa, a secure aggregation protocol for FL, which breaks this barrier - it is efficient and addresses the existence of malicious actors at the core of its design. Similar to prior work on Prio and Prio+, Elsa provides a novel secure aggregation protocol built out of distributed trust across two servers that keeps individual client updates private as long as one server is honest, defends against malicious clients, and is efficient end-to-end. Compared to prior works, the distinguishing theme in Elsa is that instead of the servers generating cryptographic correlations interactively, the clients act as untrusted dealers of these correlations without compromising the protocol’s security. This leads to a much faster protocol while also achieving stronger security at that efficiency compared to prior work. We introduce new techniques that retain privacy even when a server is malicious at a small added cost of 7-25% in runtime with negligible increase in communication over the case of semi-honest server. Our work improves end-to-end runtime over prior work with similar security guarantees by big margins - single-aggregator RoFL by up to 305x (for the models we consider), and distributed trust Prio by up to 8x.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131011436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches WarpAttack:通过编译器引入的双取绕过CFI
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179433
Jianhao Xu, L. Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer
Code-reuse attacks are dangerous threats that attracted the attention of the security community for years. These attacks aim at corrupting important control-flow transfers for taking control of a process without injecting code. Nowadays, the combinations of multiple mitigations (e.g., ASLR, DEP, and CFI) drastically reduced this attack surface, making running code-reuse exploits more challenging.Unfortunately, security mitigations are combined with compiler optimizations, that do not distinguish between security-related and application code. Blindly deploying code optimizations over code-reuse mitigations may undermine their security guarantees. For instance, compilers may introduce double-fetch vulnerabilities that lead to concurrency issues such as Time-Of-Check to Time-Of-Use (TOCTTOU) attacks.In this work, we propose a new attack vector, called WarpAttack, that exploits compiler-introduced double-fetch optimizations to mount TOCTTOU attacks and bypass code-reuse mitigations. We study the mechanism underlying this attack and present a practical proof-of-concept exploit against the last version of Firefox. Additionally, we propose a lightweight analysis to locate vulnerable double-fetch code (with 3% false positives) and conduct research over six popular applications, five operating systems, and four architectures (32 and 64 bits) to study the diffusion of this threat. Moreover, we study the implication of our attack against six CFI implementations. Finally, we investigate possible research lines for addressing this threat and propose practical solutions to be deployed in existing projects.
代码重用攻击是一种危险的威胁,多年来一直引起安全社区的注意。这些攻击的目的是破坏重要的控制流传输,以便在不注入代码的情况下控制进程。如今,多种缓解措施(例如,ASLR、DEP和CFI)的组合大大减少了这种攻击面,使运行代码重用攻击更具挑战性。不幸的是,安全性缓解与编译器优化结合在一起,无法区分与安全性相关的代码和应用程序代码。盲目地部署代码优化而忽略代码重用缓解可能会破坏其安全性保证。例如,编译器可能引入双重获取漏洞,导致并发性问题,如检查时间到使用时间(TOCTTOU)攻击。在这项工作中,我们提出了一种新的攻击向量,称为WarpAttack,它利用编译器引入的双取优化来加载TOCTTOU攻击并绕过代码重用缓解。我们研究了这种攻击背后的机制,并提出了一个针对最新版本Firefox的实用的概念验证漏洞。此外,我们提出了一种轻量级分析来定位易受攻击的双取代码(有3%的误报),并对六种流行的应用程序、五种操作系统和四种架构(32位和64位)进行研究,以研究这种威胁的扩散。此外,我们还研究了针对六种CFI实现的攻击的含义。最后,我们调查了解决这一威胁的可能研究路线,并提出了在现有项目中部署的实际解决方案。
{"title":"WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches","authors":"Jianhao Xu, L. Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer","doi":"10.1109/SP46215.2023.10179433","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179433","url":null,"abstract":"Code-reuse attacks are dangerous threats that attracted the attention of the security community for years. These attacks aim at corrupting important control-flow transfers for taking control of a process without injecting code. Nowadays, the combinations of multiple mitigations (e.g., ASLR, DEP, and CFI) drastically reduced this attack surface, making running code-reuse exploits more challenging.Unfortunately, security mitigations are combined with compiler optimizations, that do not distinguish between security-related and application code. Blindly deploying code optimizations over code-reuse mitigations may undermine their security guarantees. For instance, compilers may introduce double-fetch vulnerabilities that lead to concurrency issues such as Time-Of-Check to Time-Of-Use (TOCTTOU) attacks.In this work, we propose a new attack vector, called WarpAttack, that exploits compiler-introduced double-fetch optimizations to mount TOCTTOU attacks and bypass code-reuse mitigations. We study the mechanism underlying this attack and present a practical proof-of-concept exploit against the last version of Firefox. Additionally, we propose a lightweight analysis to locate vulnerable double-fetch code (with 3% false positives) and conduct research over six popular applications, five operating systems, and four architectures (32 and 64 bits) to study the diffusion of this threat. Moreover, we study the implication of our attack against six CFI implementations. Finally, we investigate possible research lines for addressing this threat and propose practical solutions to be deployed in existing projects.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel 当自顶向下遇到自底向上:检测和利用Linux内核中清理后使用的错误
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179356
Lin Ma, Duoming Zhou, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, L. Wu, K. Ren
When a device is detached from the system, Use-After-Cleanup (UAC) bugs can occur because a running kernel thread may be unaware of the device detachment and attempt to use an object that has been released by the cleanup thread. Our investigation suggests that an attacker can exploit the UAC bugs to obtain the capability of arbitrary code execution and privilege escalation, which receives little attention from the community. While existing tools mainly focus on well-known concurrency bugs like data race, few target UAC bugs.In this paper, we propose a tool named UACatcher to systematically detect UAC bugs. UACatcher consists of three main phases. It first scans the entire kernel to find target layers. Next, it adopts the context- and flow-sensitive inter-procedural analysis and the points-to analysis to locate possible free (deallocation) sites in the bottom-up cleanup thread and use (dereference) sites in the top-down kernel thread that can cause UAC bugs. Then, UACatcher uses the routine switch point algorithm which counts on the synchronizations and path constraints to detect UAC bugs among these sites and estimate exploitable ones. For exploitable bugs, we leverage the pseudoterminal-based device emulation technique to develop practical exploits.We have implemented a prototype of UACatcher and evaluated it on 5.11 Linux kernel. As a result, our tool successfully detected 346 UAC bugs, which were reported to the community (277 have been confirmed and fixed and 15 CVEs have been assigned). Additionally, 13 bugs are exploitable, which can be used to develop working exploits that gain the arbitrary code execution primitive in kernel space and achieve the privilege escalation. Finally, we discuss UACatcher’s limitations and propose possible solutions to fix and prevent UAC bugs.
当设备从系统中分离出来时,可能会出现“清理后使用”(use - after - cleanup, UAC)错误,因为正在运行的内核线程可能不知道设备分离,并试图使用清理线程释放的对象。我们的调查表明,攻击者可以利用UAC漏洞获得任意代码执行和特权升级的能力,这一点很少受到社区的关注。虽然现有的工具主要关注众所周知的并发错误,如数据竞争,但很少针对UAC错误。在本文中,我们提出了一个名为UACatcher的工具来系统地检测UAC漏洞。UACatcher包括三个主要阶段。它首先扫描整个内核以找到目标层。接下来,它采用上下文和流程敏感的过程间分析和指向分析来定位自底向上清理线程中可能的空闲(释放)位置和自顶向下内核线程中可能导致UAC错误的使用(解引用)位置。然后,UACatcher使用基于同步和路径约束的常规切换点算法来检测这些站点之间的UAC漏洞并估计可利用的漏洞。对于可利用的漏洞,我们利用基于伪终端的设备仿真技术来开发实用的漏洞。我们实现了UACatcher的原型,并在5.11 Linux内核上对其进行了评估。结果,我们的工具成功检测了346个UAC漏洞,并向社区报告了这些漏洞(277个已被确认并修复,并分配了15个cve)。此外,有13个漏洞是可利用的,它们可用于开发工作漏洞,从而获得内核空间中的任意代码执行原语并实现特权升级。最后,我们讨论了UACatcher的局限性,并提出了修复和防止UAC错误的可能解决方案。
{"title":"When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel","authors":"Lin Ma, Duoming Zhou, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, L. Wu, K. Ren","doi":"10.1109/SP46215.2023.10179356","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179356","url":null,"abstract":"When a device is detached from the system, Use-After-Cleanup (UAC) bugs can occur because a running kernel thread may be unaware of the device detachment and attempt to use an object that has been released by the cleanup thread. Our investigation suggests that an attacker can exploit the UAC bugs to obtain the capability of arbitrary code execution and privilege escalation, which receives little attention from the community. While existing tools mainly focus on well-known concurrency bugs like data race, few target UAC bugs.In this paper, we propose a tool named UACatcher to systematically detect UAC bugs. UACatcher consists of three main phases. It first scans the entire kernel to find target layers. Next, it adopts the context- and flow-sensitive inter-procedural analysis and the points-to analysis to locate possible free (deallocation) sites in the bottom-up cleanup thread and use (dereference) sites in the top-down kernel thread that can cause UAC bugs. Then, UACatcher uses the routine switch point algorithm which counts on the synchronizations and path constraints to detect UAC bugs among these sites and estimate exploitable ones. For exploitable bugs, we leverage the pseudoterminal-based device emulation technique to develop practical exploits.We have implemented a prototype of UACatcher and evaluated it on 5.11 Linux kernel. As a result, our tool successfully detected 346 UAC bugs, which were reported to the community (277 have been confirmed and fixed and 15 CVEs have been assigned). Additionally, 13 bugs are exploitable, which can be used to develop working exploits that gain the arbitrary code execution primitive in kernel space and achieve the privilege escalation. Finally, we discuss UACatcher’s limitations and propose possible solutions to fix and prevent UAC bugs.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches 在可编程交换机上实现大规模和动态链路泛洪防御
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179404
Huancheng Zhou, Sungmin Hong, Yangyang Liu, Xiapu Luo, Weichao Li, G. Gu
Link-flooding attacks (LFAs) can cut off the Internet connection to selected server targets and are hard to mitigate because adversaries use normal-looking and low-rate flows and can dynamically adjust the attack strategy. Traditional centralized defense systems cannot locally and efficiently suppress malicious traffic. Though emerging programmable switches offer an opportunity to bring defense systems closer to targeted links, their limited resource and lack of support for runtime reconfiguration limit their usage for link-flooding defenses.We present Mew1, a resource-efficient and runtime adaptable link-flooding defense system. Mew can counter various LFAs even when a massive number of flows are concentrated on a link, or when the attack strategy changes quickly. We design a distributed storage mechanism and a lossless state migration mechanism to reduce the storage bottleneck of programmable networks. We develop cooperative defense APIs to support multi-grained co-detection and co-mitigation without excessive overhead. Mew's dynamic defense mechanism can constantly analyze network conditions and activate corresponding defenses without rebooting devices or interrupting other running functions. We develop a prototype of Mew by using real-world programmable switches, which are located in five cities. Our experiments show that the real-world prototype can defend against large-scale and dynamic LFAs effectively.
链路泛洪攻击(LFAs)可以切断与选定服务器目标的Internet连接,并且很难缓解,因为攻击者使用看起来正常的低速率流,并且可以动态调整攻击策略。传统的集中式防御系统无法本地有效地抑制恶意流量。虽然新兴的可编程交换机提供了使防御系统更接近目标链路的机会,但它们有限的资源和缺乏对运行时重新配置的支持限制了它们用于链路泛洪防御的使用。本文提出了一种资源高效、运行时适应性强的链路泛洪防御系统Mew1。即使当大量的流量集中在一个链接上,或者当攻击策略快速变化时,new也可以对抗各种lfa。为了减少可编程网络的存储瓶颈,我们设计了分布式存储机制和无损状态迁移机制。我们开发了协作防御api,以支持多粒度的协同检测和协同缓解,而不会产生过多的开销。新动态防御机制可以在不重启设备或中断其他运行功能的情况下,不断分析网络状况并激活相应的防御。我们通过使用位于五个城市的真实可编程开关开发了一个新原型。我们的实验表明,现实世界的原型可以有效地防御大规模和动态lfa。
{"title":"Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches","authors":"Huancheng Zhou, Sungmin Hong, Yangyang Liu, Xiapu Luo, Weichao Li, G. Gu","doi":"10.1109/SP46215.2023.10179404","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179404","url":null,"abstract":"Link-flooding attacks (LFAs) can cut off the Internet connection to selected server targets and are hard to mitigate because adversaries use normal-looking and low-rate flows and can dynamically adjust the attack strategy. Traditional centralized defense systems cannot locally and efficiently suppress malicious traffic. Though emerging programmable switches offer an opportunity to bring defense systems closer to targeted links, their limited resource and lack of support for runtime reconfiguration limit their usage for link-flooding defenses.We present Mew1, a resource-efficient and runtime adaptable link-flooding defense system. Mew can counter various LFAs even when a massive number of flows are concentrated on a link, or when the attack strategy changes quickly. We design a distributed storage mechanism and a lossless state migration mechanism to reduce the storage bottleneck of programmable networks. We develop cooperative defense APIs to support multi-grained co-detection and co-mitigation without excessive overhead. Mew's dynamic defense mechanism can constantly analyze network conditions and activate corresponding defenses without rebooting devices or interrupting other running functions. We develop a prototype of Mew by using real-world programmable switches, which are located in five cities. Our experiments show that the real-world prototype can defend against large-scale and dynamic LFAs effectively.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130246321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1