首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security 这就像用牙线清洁牙齿:关于软件供应链安全的可复制构建的重要性和挑战
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179320
Marcel Fourné, Dominik Wermke, W. Enck, S. Fahl, Y. Acar
The 2020 Solarwinds attack was a tipping point that caused a heightened awareness about the security of the software supply chain and in particular the large amount of trust placed in build systems. Reproducible Builds (R-Bs) provide a strong foundation to build defenses for arbitrary attacks against build systems by ensuring that given the same source code, build environment, and build instructions, bitwise-identical artifacts are created. Unfortunately, much of the software industry believes R-Bs are too far out of reach for most projects. The goal of this paper is to help identify a path for R-Bs to become a commonplace property.To this end, we conducted a series of 24 semi-structured expert interviews with participants from the Reproducible-Builds.org project, finding that self-effective work by highly motivated developers and collaborative communication with upstream projects are key contributors to R-Bs. We identified a range of motivations that can encourage open source developers to strive for R-Bs, including indicators of quality, security benefits, and more efficient caching of artifacts. We also identify experiences that help and hinder adoption, which often revolves around communication with upstream projects. We conclude with recommendations on how to better integrate R-Bs with the efforts of the open source and free software community.
2020年太阳风的攻击是一个转折点,引起了人们对软件供应链安全性的高度认识,特别是对构建系统的大量信任。可复制构建(r - b)通过确保给定相同的源代码、构建环境和构建指令,创建位相同的工件,为构建针对构建系统的任意攻击的防御提供了坚实的基础。不幸的是,很多软件行业认为r - b对于大多数项目来说太遥不可及了。本文的目标是帮助确定r - b成为普通属性的路径。为此,我们对来自Reproducible-Builds.org项目的参与者进行了24次半结构化的专家访谈,发现高度积极的开发人员的自我有效工作以及与上游项目的协作沟通是r - b的关键贡献者。我们确定了一系列可以鼓励开源开发人员为r - b而奋斗的动机,包括质量指标、安全性好处和更有效的工件缓存。我们还确定了帮助和阻碍采用的经验,这些经验通常围绕着与上游项目的沟通。最后,我们就如何更好地将r - b与开源和自由软件社区的努力集成在一起提出了建议。
{"title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security","authors":"Marcel Fourné, Dominik Wermke, W. Enck, S. Fahl, Y. Acar","doi":"10.1109/SP46215.2023.10179320","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179320","url":null,"abstract":"The 2020 Solarwinds attack was a tipping point that caused a heightened awareness about the security of the software supply chain and in particular the large amount of trust placed in build systems. Reproducible Builds (R-Bs) provide a strong foundation to build defenses for arbitrary attacks against build systems by ensuring that given the same source code, build environment, and build instructions, bitwise-identical artifacts are created. Unfortunately, much of the software industry believes R-Bs are too far out of reach for most projects. The goal of this paper is to help identify a path for R-Bs to become a commonplace property.To this end, we conducted a series of 24 semi-structured expert interviews with participants from the Reproducible-Builds.org project, finding that self-effective work by highly motivated developers and collaborative communication with upstream projects are key contributors to R-Bs. We identified a range of motivations that can encourage open source developers to strive for R-Bs, including indicators of quality, security benefits, and more efficient caching of artifacts. We also identify experiences that help and hinder adoption, which often revolves around communication with upstream projects. We conclude with recommendations on how to better integrate R-Bs with the efforts of the open source and free software community.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance 分布式匿名证书颁发的阈值BBS+签名
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179470
Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other words, an anonymous credential scheme with threshold issuance. We prove that due to the structure of the BBS+ signature, simply verifying the signature produced by an otherwise semi-honest protocol is sufficient to achieve composable security against a malicious adversary. Consequently, our protocol is extremely simple and efficient: it involves a single request from the client (who requires a signature) to the signing parties, two exchanges of messages among the signing parties, and finally a response to the client; in some deployment scenarios the concrete cost bottleneck may be the client’s local verification of the signature that it receives. Furthermore, our protocol can be extended to support the strongest form of blind signing and to serve as a distributed evaluation protocol for the Dodis-Yampolskiy Oblivious VRF. We validate our efficiency claims by implementing and benchmarking our protocol.
针对BBS+签名方案,提出了一种安全的多方签名协议;换句话说,是具有阈值发布的匿名凭证方案。我们证明,由于BBS+签名的结构,只需验证由其他半诚实协议产生的签名就足以实现针对恶意对手的可组合安全性。因此,我们的协议非常简单和高效:它包括客户端(需要签名)对签名方的单个请求,签名方之间的两次消息交换,最后对客户端的响应;在某些部署场景中,具体的成本瓶颈可能是客户端对其接收到的签名进行本地验证。此外,我们的协议可以扩展到支持最强形式的盲签名,并作为Dodis-Yampolskiy遗忘VRF的分布式评估协议。我们通过实现和基准测试我们的协议来验证我们的效率声明。
{"title":"Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance","authors":"Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner","doi":"10.1109/SP46215.2023.10179470","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179470","url":null,"abstract":"We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other words, an anonymous credential scheme with threshold issuance. We prove that due to the structure of the BBS+ signature, simply verifying the signature produced by an otherwise semi-honest protocol is sufficient to achieve composable security against a malicious adversary. Consequently, our protocol is extremely simple and efficient: it involves a single request from the client (who requires a signature) to the signing parties, two exchanges of messages among the signing parties, and finally a response to the client; in some deployment scenarios the concrete cost bottleneck may be the client’s local verification of the signature that it receives. Furthermore, our protocol can be extended to support the strongest form of blind signing and to serve as a distributed evaluation protocol for the Dodis-Yampolskiy Oblivious VRF. We validate our efficiency claims by implementing and benchmarking our protocol.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
mmEcho: A mmWave-based Acoustic Eavesdropping Method mmEcho:一种基于毫米波的声学窃听方法
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179484
Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng
Acoustic eavesdropping targeting private or confidential spaces is one of the most severe privacy threats. Soundproof rooms may reduce such risks, but they cannot prevent sophisticated eavesdropping, which has been an emerging research trend in recent years. Researchers have investigated such acoustic eavesdropping attacks via sensor-enabled side-channels. However, such attacks either make unrealistic assumptions or have considerable constraints. This paper introduces mmEcho, an acoustic eavesdropping system that uses a millimeter-wave radio signal to accurately measure the micrometer-level vibration of an object induced by sound waves. Compared with previous works, our eavesdropping method is highly accurate and requires no prior knowledge about the victim. We evaluate the performance of mmEcho under extensive real-world settings and scenarios. Our results show that mmEcho can accurately reconstruct audio from moving sources at various distances, orientations, reverberating objects, sound insulators, spoken languages, and sound levels.
针对私人或机密空间的声学窃听是最严重的隐私威胁之一。隔音室可能会降低这种风险,但它们无法阻止精密窃听,这是近年来新兴的研究趋势。研究人员已经研究了这种通过启用传感器的侧信道进行的声学窃听攻击。然而,这种攻击要么做出不切实际的假设,要么有相当大的限制。mmEcho是一种利用毫米波无线电信号精确测量由声波引起的物体微米级振动的声学窃听系统。与以前的工作相比,我们的窃听方法具有很高的准确性,并且不需要事先了解受害者。我们在广泛的现实环境和场景下评估了mmEcho的性能。我们的研究结果表明,mmEcho可以准确地重建来自不同距离、方向、混响物体、隔音体、口语和声级的移动声源的音频。
{"title":"mmEcho: A mmWave-based Acoustic Eavesdropping Method","authors":"Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng","doi":"10.1109/SP46215.2023.10179484","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179484","url":null,"abstract":"Acoustic eavesdropping targeting private or confidential spaces is one of the most severe privacy threats. Soundproof rooms may reduce such risks, but they cannot prevent sophisticated eavesdropping, which has been an emerging research trend in recent years. Researchers have investigated such acoustic eavesdropping attacks via sensor-enabled side-channels. However, such attacks either make unrealistic assumptions or have considerable constraints. This paper introduces mmEcho, an acoustic eavesdropping system that uses a millimeter-wave radio signal to accurately measure the micrometer-level vibration of an object induced by sound waves. Compared with previous works, our eavesdropping method is highly accurate and requires no prior knowledge about the victim. We evaluate the performance of mmEcho under extensive real-world settings and scenarios. Our results show that mmEcho can accurately reconstruct audio from moving sources at various distances, orientations, reverberating objects, sound insulators, spoken languages, and sound levels.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"27 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120853730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigating the Password Policy Practices of Website Administrators 调查网站管理员的密码策略
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179288
S. Şahin, Suood Abdulaziz Al-Roomi, Tara Poteat, Frank H. Li
Passwords are the de facto standard for online authentication today, and will likely remain so for the foreseeable future. As a consequence, the security community has extensively explored how users behave with passwords, producing recommendations for password policies that promote password security and usability for users. However, it is the website administrators who must adopt such recommendations to enact improvements to online authentication in practice. To date, there has been limited investigation of how web administrators manage password policies for their sites. To improve online authentication at scale, we must understand the factors behind this specific population’s behaviors and decisions, and how to help administrators deploy more secure password policies.In this paper, we explore how web administrators determine the password policies that they employ, what considerations impact a policy’s evolution, and what challenges administrators encounter when managing a site’s policy. To do so, we conduct an online survey and in-depth semi-structured interviews with 11 US-based web administrators with direct experience managing website password policies. Through our qualitative study, we identify a small set of key factors driving the majority of password policy decisions, and barriers that inhibit administrators from enacting policies that are more aligned with modern guidelines. Moving forward, we propose directions for future research and community action that may help administrators manage password policies more effectively.
密码是当今在线身份验证的事实上的标准,在可预见的未来可能仍将如此。因此,安全社区广泛地研究了用户如何使用密码,并提出了密码策略建议,以提高用户的密码安全性和可用性。然而,网站管理员必须采纳这些建议,以便在实践中对在线身份验证进行改进。到目前为止,关于网站管理员如何管理其网站的密码策略的调查还很有限。为了大规模地改进在线身份验证,我们必须了解这些特定人群的行为和决策背后的因素,以及如何帮助管理员部署更安全的密码策略。在本文中,我们探讨了web管理员如何确定他们采用的密码策略,哪些因素会影响策略的演变,以及管理员在管理网站策略时遇到的挑战。为此,我们进行了一项在线调查,并与11位具有直接管理网站密码政策经验的美国网站管理员进行了深入的半结构化访谈。通过我们的定性研究,我们确定了驱动大多数密码策略决策的一小部分关键因素,以及阻碍管理员制定更符合现代指导方针的策略的障碍。展望未来,我们提出了未来研究和社区行动的方向,可以帮助管理员更有效地管理密码策略。
{"title":"Investigating the Password Policy Practices of Website Administrators","authors":"S. Şahin, Suood Abdulaziz Al-Roomi, Tara Poteat, Frank H. Li","doi":"10.1109/SP46215.2023.10179288","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179288","url":null,"abstract":"Passwords are the de facto standard for online authentication today, and will likely remain so for the foreseeable future. As a consequence, the security community has extensively explored how users behave with passwords, producing recommendations for password policies that promote password security and usability for users. However, it is the website administrators who must adopt such recommendations to enact improvements to online authentication in practice. To date, there has been limited investigation of how web administrators manage password policies for their sites. To improve online authentication at scale, we must understand the factors behind this specific population’s behaviors and decisions, and how to help administrators deploy more secure password policies.In this paper, we explore how web administrators determine the password policies that they employ, what considerations impact a policy’s evolution, and what challenges administrators encounter when managing a site’s policy. To do so, we conduct an online survey and in-depth semi-structured interviews with 11 US-based web administrators with direct experience managing website password policies. Through our qualitative study, we identify a small set of key factors driving the majority of password policy decisions, and barriers that inhibit administrators from enacting policies that are more aligned with modern guidelines. Moving forward, we propose directions for future research and community action that may help administrators manage password policies more effectively.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes 基于自然风格变化的人脸识别系统物理模拟攻击
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179360
Shengwei An, Y. Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang
This paper presents a novel physical impersonating attack against face recognition systems. It aims at generating consistent style changes across multiple pictures of the attacker under different conditions and poses. Additionally, the style changes are required to be physically realizable by make-up and can induce the intended misclassification. To achieve the goal, we develop novel techniques to embed multiple pictures of the same physical person to vectors in the StyleGAN’s latent space, such that the embedded latent vectors have some implicit correlations to make the search for consistent style changes feasible. Our digital and physical evaluation results show our approach can allow an outsider attacker to successfully impersonate the insiders with consistent and natural changes.
提出了一种针对人脸识别系统的物理模拟攻击方法。它旨在在不同条件和姿势下的攻击者的多张照片中生成一致的风格变化。此外,样式变化需要通过化妆在物理上实现,并且可能导致预期的错误分类。为了实现这一目标,我们开发了新的技术,将同一个人的多张图片嵌入到StyleGAN潜在空间中的向量中,使得嵌入的潜在向量具有一些隐式相关性,从而使得搜索一致的风格变化变得可行。我们的数字和物理评估结果表明,我们的方法可以允许外部攻击者通过一致和自然的变化成功地模拟内部人员。
{"title":"ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes","authors":"Shengwei An, Y. Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang","doi":"10.1109/SP46215.2023.10179360","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179360","url":null,"abstract":"This paper presents a novel physical impersonating attack against face recognition systems. It aims at generating consistent style changes across multiple pictures of the attacker under different conditions and poses. Additionally, the style changes are required to be physically realizable by make-up and can induce the intended misclassification. To achieve the goal, we develop novel techniques to embed multiple pictures of the same physical person to vectors in the StyleGAN’s latent space, such that the embedded latent vectors have some implicit correlations to make the search for consistent style changes feasible. Our digital and physical evaluation results show our approach can allow an outsider attacker to successfully impersonate the insiders with consistent and natural changes.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128179087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models 自信蒙特卡罗:概率密码模型猜测曲线的严格分析
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179365
Peiyuan Liu, Jeremiah Blocki, Wenjie Bai
In password security a defender would like to identify and warn users with weak passwords. Similarly, the defender may also want to predict what fraction of passwords would be cracked within B guesses as the attacker’s guessing budget B varies from small (online attacker) to large (offline attacker). Towards each of these goals the defender would like to quickly estimate the guessing number for each user password pwd assuming that the attacker uses a password cracking model M i.e., how many password guesses will the attacker check before s/he cracks each user password pwd. Since naïve brute-force enumeration can be prohibitively expensive when the guessing number is very large, Dell’Amico and Filippone [1] developed an efficient Monte Carlo algorithm to estimate the guessing number of a given password pwd. While Dell’Amico and Filippone proved that their estimator is unbiased there is no guarantee that the Monte Carlo estimates are accurate nor does the method provide confidence ranges on the estimated guessing number or even indicate if/when there is a higher degree of uncertainty.Our contributions are as follows: First, we identify theoretical examples where, with high probability, Monte Carlo Strength estimation produces highly inaccurate estimates of individual guessing numbers as well as the entire guessing curve. Second, we introduce Confident Monte Carlo Strength Estimation as an extension of Dell’Amico and Filippone [1]. Given a password our estimator generates an upper and lower bound with the guarantee that, except with probability δ, the true guessing number lies within the given confidence range. Our techniques can also be used to characterize the attacker’s guessing curve. In particular, given a probabilistic password cracking model M we can generate high confidence upper and lower bounds on the fraction of passwords that the attacker will crack as the guessing budget B varies.
在密码安全中,防御者希望识别并警告使用弱密码的用户。类似地,防御者也可能希望预测在B次猜测中有多少密码会被破解,因为攻击者的猜测预算B从小(在线攻击者)到大(离线攻击者)不等。为了实现这些目标,防御者希望快速估计每个用户密码pwd的猜测次数,假设攻击者使用密码破解模型M,即攻击者在破解每个用户密码pwd之前将检查多少次密码猜测。由于naïve暴力枚举在猜测数非常大的情况下可能会非常昂贵,因此Dell 'Amico和Filippone[1]开发了一种高效的蒙特卡罗算法来估计给定密码pwd的猜测数。虽然Dell 'Amico和Filippone证明了他们的估计器是无偏的,但不能保证蒙特卡罗估计是准确的,该方法也不能提供估计猜测数的置信范围,甚至不能表明是否/何时存在更高程度的不确定性。我们的贡献如下:首先,我们确定了理论上的例子,在高概率下,蒙特卡罗强度估计对单个猜测数字以及整个猜测曲线产生高度不准确的估计。其次,我们引入了自信蒙特卡罗强度估计,作为Dell 'Amico和Filippone[1]的扩展。给定一个密码,我们的估计器生成一个上界和下界,并保证除了概率δ之外,真实猜测数在给定的置信范围内。我们的技术还可以用来描述攻击者的猜测曲线。特别是,给定一个概率密码破解模型M,我们可以生成随着猜测预算B的变化,攻击者将破解的密码比例的高置信度上界和下界。
{"title":"Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models","authors":"Peiyuan Liu, Jeremiah Blocki, Wenjie Bai","doi":"10.1109/SP46215.2023.10179365","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179365","url":null,"abstract":"In password security a defender would like to identify and warn users with weak passwords. Similarly, the defender may also want to predict what fraction of passwords would be cracked within B guesses as the attacker’s guessing budget B varies from small (online attacker) to large (offline attacker). Towards each of these goals the defender would like to quickly estimate the guessing number for each user password pwd assuming that the attacker uses a password cracking model M i.e., how many password guesses will the attacker check before s/he cracks each user password pwd. Since naïve brute-force enumeration can be prohibitively expensive when the guessing number is very large, Dell’Amico and Filippone [1] developed an efficient Monte Carlo algorithm to estimate the guessing number of a given password pwd. While Dell’Amico and Filippone proved that their estimator is unbiased there is no guarantee that the Monte Carlo estimates are accurate nor does the method provide confidence ranges on the estimated guessing number or even indicate if/when there is a higher degree of uncertainty.Our contributions are as follows: First, we identify theoretical examples where, with high probability, Monte Carlo Strength estimation produces highly inaccurate estimates of individual guessing numbers as well as the entire guessing curve. Second, we introduce Confident Monte Carlo Strength Estimation as an extension of Dell’Amico and Filippone [1]. Given a password our estimator generates an upper and lower bound with the guarantee that, except with probability δ, the true guessing number lies within the given confidence range. Our techniques can also be used to characterize the attacker’s guessing curve. In particular, given a probabilistic password cracking model M we can generate high confidence upper and lower bounds on the fraction of passwords that the attacker will crack as the guessing budget B varies.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks 诱导无线充电器为听不见的命令攻击发声
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179363
Donghui Dai, Zhenlin An, Lei Yang
Recent works demonstrated that speech recognition systems or voice assistants can be manipulated by malicious voice commands, which are injected through various inaudible media, such as ultrasound, laser, and electromagnetic interference (EMI). In this work, we explore a new kind of inaudible voice attack through the magnetic interference induced by a wireless charger. Essentially, we show that the microphone components of smart devices suffer from severe magnetic interference when they are enjoying wireless charging, due to the absence of effective protection against the EMI at low frequencies (100 kHz or below). By taking advantage of this vulnerability, we design two inaudible voice attacks, HeartwormAttack and ParasiteAttack, both of which aim to inject malicious voice commands into smart devices being wirelessly charged. They make use of a compromised wireless charger or accessory equipment (called parasite) to inject the voice, respectively. We conduct extensive experiments with 17 victim devices (iPhone, Huawei, Samsung, etc.) and 6 types of voice assistants (Siri, Google STT, Bixby, etc.). Evaluation results demonstrate the feasibility of two proposed attacks with commercial charging settings.
最近的研究表明,语音识别系统或语音助手可以被恶意的语音命令操纵,这些语音命令通过各种听不见的媒体注入,如超声波、激光和电磁干扰(EMI)。在这项工作中,我们探索了一种通过无线充电器产生的磁干扰来攻击听不见声音的新方法。从本质上讲,我们表明智能设备的麦克风组件在享受无线充电时遭受严重的磁干扰,因为缺乏对低频(100 kHz或以下)EMI的有效保护。通过利用这个漏洞,我们设计了两种听不见的语音攻击,HeartwormAttack和ParasiteAttack,这两种攻击都旨在将恶意语音命令注入无线充电的智能设备。他们分别使用一个受损的无线充电器或附属设备(称为寄生虫)来注入声音。我们对17种受害设备(iPhone、华为、三星等)和6种语音助手(Siri、b谷歌STT、Bixby等)进行了广泛的实验。评估结果证明了在商业收费设置下提出的两种攻击的可行性。
{"title":"Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks","authors":"Donghui Dai, Zhenlin An, Lei Yang","doi":"10.1109/SP46215.2023.10179363","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179363","url":null,"abstract":"Recent works demonstrated that speech recognition systems or voice assistants can be manipulated by malicious voice commands, which are injected through various inaudible media, such as ultrasound, laser, and electromagnetic interference (EMI). In this work, we explore a new kind of inaudible voice attack through the magnetic interference induced by a wireless charger. Essentially, we show that the microphone components of smart devices suffer from severe magnetic interference when they are enjoying wireless charging, due to the absence of effective protection against the EMI at low frequencies (100 kHz or below). By taking advantage of this vulnerability, we design two inaudible voice attacks, HeartwormAttack and ParasiteAttack, both of which aim to inject malicious voice commands into smart devices being wirelessly charged. They make use of a compromised wireless charger or accessory equipment (called parasite) to inject the voice, respectively. We conduct extensive experiments with 17 victim devices (iPhone, Huawei, Samsung, etc.) and 6 types of voice assistants (Siri, Google STT, Bixby, etc.). Evaluation results demonstrate the feasibility of two proposed attacks with commercial charging settings.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130892916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Private Collaborative Data Cleaning via Non-Equi PSI 通过非equi PSI进行私人协作数据清理
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179337
Erik-Oliver Blass, F. Kerschbaum
We introduce and investigate the privacy-preserving version of collaborative data cleaning. With collaborative data cleaning, two parties want to reconcile their data sets to filter out badly classified, misclassified data items. In the privacy-preserving (private) version of data cleaning, the additional security goal is that parties should only learn their misclassified data items, but nothing else about the other party’s data set. The problem of private data cleaning is essentially a variation of private set intersection (PSI), and one could employ recent circuit-PSI techniques to compute misclassifications with privacy. However, we design, analyze, and implement three new protocols tailored to the specifics of private data cleaning that outperform a circuit-PSI-based approach. With the first protocol, we exploit the idea that a small additional leakage (the differentially private size of the intersection of data items) allows for a reduction in complexity over circuit-PSI. The other two protocols convert the problem of finding a mismatch in data classifications into finding a match, and then follow the standard technique of using oblivious pseudorandom functions (OPRF) for computing PSI. Depending on the number of data classes, this leads to a concrete runtime improvement over circuit-PSI.
我们介绍并研究了协作数据清理的隐私保护版本。通过协作数据清理,双方希望协调他们的数据集,以过滤掉分类糟糕、分类错误的数据项。在数据清理的隐私保护(私有)版本中,额外的安全目标是各方应该只了解他们错误分类的数据项,而不了解对方的数据集。私有数据清理问题本质上是私有集交集(PSI)的一种变体,可以使用最近的电路PSI技术来计算带有隐私的错误分类。然而,我们设计、分析和实现了三种新的协议,这些协议针对私有数据清理的具体情况量身定制,优于基于电路psi的方法。对于第一个协议,我们利用了一个小的额外泄漏(数据项相交的不同私有大小)的想法,允许降低电路psi的复杂性。另外两个协议将查找数据分类中不匹配的问题转换为查找匹配的问题,然后遵循使用无关伪随机函数(OPRF)计算PSI的标准技术。根据数据类的数量,这会导致比circuit-PSI更具体的运行时改进。
{"title":"Private Collaborative Data Cleaning via Non-Equi PSI","authors":"Erik-Oliver Blass, F. Kerschbaum","doi":"10.1109/SP46215.2023.10179337","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179337","url":null,"abstract":"We introduce and investigate the privacy-preserving version of collaborative data cleaning. With collaborative data cleaning, two parties want to reconcile their data sets to filter out badly classified, misclassified data items. In the privacy-preserving (private) version of data cleaning, the additional security goal is that parties should only learn their misclassified data items, but nothing else about the other party’s data set. The problem of private data cleaning is essentially a variation of private set intersection (PSI), and one could employ recent circuit-PSI techniques to compute misclassifications with privacy. However, we design, analyze, and implement three new protocols tailored to the specifics of private data cleaning that outperform a circuit-PSI-based approach. With the first protocol, we exploit the idea that a small additional leakage (the differentially private size of the intersection of data items) allows for a reduction in complexity over circuit-PSI. The other two protocols convert the problem of finding a mismatch in data classifications into finding a match, and then follow the standard technique of using oblivious pseudorandom functions (OPRF) for computing PSI. Depending on the number of data classes, this leads to a concrete runtime improvement over circuit-PSI.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134274942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense 只为你泄露的内容付费:利用沙箱进行微创浏览器指纹防御
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179385
Ryan Torok, A. Levy
We present Sandcastle, an entropy-based browser fingerprinting defense that aims to minimize its interference with legitimate web applications. Sandcastle allows developers to partition code that operates on identifiable information into sandboxes to prove to the browser the information cannot be sent in any network request. Meanwhile, sandboxes may make full use of identifiable information on the client side, including writing to dedicated regions of the Document Object Model. For applications where this policy is too strict, Sandcastle provides an expressive cashier that allows precise control over the granularity of data that is leaked to the network. These features allow Sandcastle to eliminate most or all of the noise added to the outputs of identifiable APIs by Chrome’s Privacy Budget framework, the current state of the art in entropy-based fingerprinting defenses. Enabling unlimited client-side use of identifiable information allows for a much more comprehensive set of web applications to run under a fingerprinting defense, such as 3D games and video streaming, and provides a mechanism to expand the space of APIs that can be introduced to the web ecosystem without sacrificing privacy.
我们介绍Sandcastle,一个基于熵的浏览器指纹防御,旨在最大限度地减少其对合法web应用程序的干扰。Sandcastle允许开发人员将操作可识别信息的代码划分到沙盒中,以向浏览器证明该信息不能在任何网络请求中发送。同时,沙箱可以充分利用客户端的可识别信息,包括写入文档对象模型的专用区域。对于该策略过于严格的应用程序,Sandcastle提供了一个表达性的收银员,允许对泄露到网络的数据粒度进行精确控制。这些功能允许Sandcastle消除大部分或所有添加到Chrome隐私预算框架的可识别api输出的噪音,这是目前基于熵的指纹防御技术的最新状态。允许客户端无限制地使用可识别信息,可以让更全面的web应用程序在指纹防御下运行,比如3D游戏和视频流,并提供一种机制来扩展api的空间,这些api可以在不牺牲隐私的情况下引入网络生态系统。
{"title":"Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense","authors":"Ryan Torok, A. Levy","doi":"10.1109/SP46215.2023.10179385","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179385","url":null,"abstract":"We present Sandcastle, an entropy-based browser fingerprinting defense that aims to minimize its interference with legitimate web applications. Sandcastle allows developers to partition code that operates on identifiable information into sandboxes to prove to the browser the information cannot be sent in any network request. Meanwhile, sandboxes may make full use of identifiable information on the client side, including writing to dedicated regions of the Document Object Model. For applications where this policy is too strict, Sandcastle provides an expressive cashier that allows precise control over the granularity of data that is leaked to the network. These features allow Sandcastle to eliminate most or all of the noise added to the outputs of identifiable APIs by Chrome’s Privacy Budget framework, the current state of the art in entropy-based fingerprinting defenses. Enabling unlimited client-side use of identifiable information allows for a much more comprehensive set of web applications to run under a fingerprinting defense, such as 3D games and video streaming, and provides a mechanism to expand the space of APIs that can be introduced to the web ecosystem without sacrificing privacy.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134270328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Multi-tab Website Fingerprinting Attacks in the Wild 健壮的多标签网站指纹攻击在野外
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179464
Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu
Website fingerprinting enables an eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting (WF) attacks have demonstrated effectiveness even against Tor-protected network traffic. However, existing WF attacks have critical limitations on accurately identifying websites in multi-tab browsing sessions, where the holistic pattern of individual websites is no longer preserved, and the number of tabs opened by a client is unknown a priori. In this paper, we propose ARES, a novel WF framework natively designed for multi-tab WF attacks. ARES formulates the multi-tab attack as a multi-label classification problem and solves it using a multi-classifier framework. Each classifier, designed based on a novel transformer model, identifies a specific website using its local patterns extracted from multiple traffic segments. We implement a prototype of ARES and extensively evaluate its effectiveness using our large-scale dataset collected over multiple months (by far the largest multi-tab WF dataset studied in academic papers.) The experimental results illustrate that ARES effectively achieves the multi-tab WF attack with the best F1-score of 0.907. Further, ARES remains robust even against various WF defenses.
网站指纹使窃听者能够确定用户通过加密连接访问哪些网站。最先进的网站指纹(WF)攻击已经证明了即使针对tor保护的网络流量也是有效的。然而,现有的WF攻击在多标签浏览会话中准确识别网站方面存在严重限制,其中不再保留单个网站的整体模式,并且客户端打开的标签数量是先验未知的。本文提出了一种新的WF框架ARES,该框架是针对多标签WF攻击而设计的。ARES将多标签攻击表述为一个多标签分类问题,并使用多分类器框架进行解决。每个分类器都是基于一种新的变压器模型设计的,它使用从多个流量段中提取的本地模式来识别特定的网站。我们实现了ARES的原型,并使用我们在多个月内收集的大规模数据集(迄今为止学术论文中研究的最大的多选项卡WF数据集)广泛评估了其有效性。实验结果表明,ARES有效地实现了多标签WF攻击,其最佳f1得分为0.907。此外,即使面对各种WF防御,ARES仍然保持强大。
{"title":"Robust Multi-tab Website Fingerprinting Attacks in the Wild","authors":"Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu","doi":"10.1109/SP46215.2023.10179464","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179464","url":null,"abstract":"Website fingerprinting enables an eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting (WF) attacks have demonstrated effectiveness even against Tor-protected network traffic. However, existing WF attacks have critical limitations on accurately identifying websites in multi-tab browsing sessions, where the holistic pattern of individual websites is no longer preserved, and the number of tabs opened by a client is unknown a priori. In this paper, we propose ARES, a novel WF framework natively designed for multi-tab WF attacks. ARES formulates the multi-tab attack as a multi-label classification problem and solves it using a multi-classifier framework. Each classifier, designed based on a novel transformer model, identifies a specific website using its local patterns extracted from multiple traffic segments. We implement a prototype of ARES and extensively evaluate its effectiveness using our large-scale dataset collected over multiple months (by far the largest multi-tab WF dataset studied in academic papers.) The experimental results illustrate that ARES effectively achieves the multi-tab WF attack with the best F1-score of 0.907. Further, ARES remains robust even against various WF defenses.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"198199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115575625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1