首页 > 最新文献

arXiv - CS - Cryptography and Security最新文献

英文 中文
H$_2$O$_2$RAM: A High-Performance Hierarchical Doubly Oblivious RAM H$_2$O$_2$RAM:高性能分层双遗忘 RAM
Pub Date : 2024-09-11 DOI: arxiv-2409.07167
Leqian Zheng, Zheng Zhang, Wentao Dong, Yao Zhang, Ye Wu, Cong Wang
The combination of Oblivious RAM (ORAM) with Trusted Execution Environments(TEE) has found numerous real-world applications due to their complementarynature. TEEs alleviate the performance bottlenecks of ORAM, such as networkbandwidth and roundtrip latency, and ORAM provides general-purpose protectionfor TEE applications against attacks exploiting memory access patterns. Thedefining property of this combination, which sets it apart from traditionalORAM designs, is its ability to ensure that memory accesses, both inside andoutside of TEEs, are made oblivious, thus termed doubly oblivious RAM(O$_2$RAM). Efforts to develop O$_2$RAM with enhanced performance are ongoing. In this work, we propose H$_2$O$_2$RAM, a high-performance doubly obliviousRAM construction. The distinguishing feature of our approach, compared to theexisting tree-based doubly oblivious designs, is its first adoption of thehierarchical framework that enjoys inherently better data locality andparallelization. While the latest hierarchical solution, FutORAMa, achievesconcrete efficiency in the classic client-server model by leveraging a relaxedassumption of sublinear-sized client-side private memory, adapting it to ourscenario poses challenges due to the conflict between this relaxed assumptionand our doubly oblivious requirement. To this end, we introduce several newefficient oblivious components to build a high-performance hierarchicalO$_2$RAM (H$_2$O$_2$RAM). We implement our design and evaluate it on variousscenarios. The results indicate that H$_2$O$_2$RAM reduces execution time by upto $sim 10^3$ times and saves memory usage by $5sim44$ times compared tostate-of-the-art solutions.
遗忘内存(ORAM)与可信执行环境(TEE)的结合因其互补性而在现实世界中得到广泛应用。TEE 可减轻 ORAM 的性能瓶颈,如网络带宽和往返延迟,而 ORAM 可为 TEE 应用程序提供通用保护,防止利用内存访问模式的攻击。这种组合有别于传统的 ORAM 设计,其决定性特性是能够确保 TEE 内部和外部的内存访问都是遗忘的,因此被称为双遗忘 RAM(O$_2$RAM)。开发性能更强的 O$_2$RAM 的工作正在进行中。在这项工作中,我们提出了 H$_2$O$_2$RAM,一种高性能的双遗忘 RAM 结构。与现有的基于树的双遗忘设计相比,我们的方法的显著特点是首次采用了分层框架,该框架本身具有更好的数据局部性和并行性。虽然最新的分层解决方案 FutORAMa 通过利用亚线性大小的客户端私有内存这一宽松假设,在经典的客户端-服务器模型中实现了具体的效率,但由于这一宽松假设与我们的双重遗忘要求之间存在冲突,因此将其适用于我们的场景会面临挑战。为此,我们引入了几个新的高效遗忘组件来构建高性能分层 O$_2$RAM (H$_2$O$_2$RAM)。我们实现了我们的设计,并在各种情况下对其进行了评估。结果表明,与最先进的解决方案相比,H$_2$O$_2$RAM最多可将执行时间缩短10^3$倍,将内存使用量节省5$/sim44$倍。
{"title":"H$_2$O$_2$RAM: A High-Performance Hierarchical Doubly Oblivious RAM","authors":"Leqian Zheng, Zheng Zhang, Wentao Dong, Yao Zhang, Ye Wu, Cong Wang","doi":"arxiv-2409.07167","DOIUrl":"https://doi.org/arxiv-2409.07167","url":null,"abstract":"The combination of Oblivious RAM (ORAM) with Trusted Execution Environments\u0000(TEE) has found numerous real-world applications due to their complementary\u0000nature. TEEs alleviate the performance bottlenecks of ORAM, such as network\u0000bandwidth and roundtrip latency, and ORAM provides general-purpose protection\u0000for TEE applications against attacks exploiting memory access patterns. The\u0000defining property of this combination, which sets it apart from traditional\u0000ORAM designs, is its ability to ensure that memory accesses, both inside and\u0000outside of TEEs, are made oblivious, thus termed doubly oblivious RAM\u0000(O$_2$RAM). Efforts to develop O$_2$RAM with enhanced performance are ongoing. In this work, we propose H$_2$O$_2$RAM, a high-performance doubly oblivious\u0000RAM construction. The distinguishing feature of our approach, compared to the\u0000existing tree-based doubly oblivious designs, is its first adoption of the\u0000hierarchical framework that enjoys inherently better data locality and\u0000parallelization. While the latest hierarchical solution, FutORAMa, achieves\u0000concrete efficiency in the classic client-server model by leveraging a relaxed\u0000assumption of sublinear-sized client-side private memory, adapting it to our\u0000scenario poses challenges due to the conflict between this relaxed assumption\u0000and our doubly oblivious requirement. To this end, we introduce several new\u0000efficient oblivious components to build a high-performance hierarchical\u0000O$_2$RAM (H$_2$O$_2$RAM). We implement our design and evaluate it on various\u0000scenarios. The results indicate that H$_2$O$_2$RAM reduces execution time by up\u0000to $sim 10^3$ times and saves memory usage by $5sim44$ times compared to\u0000state-of-the-art solutions.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code 演示:SGCode:用于安全生成代码的灵活提示优化系统
Pub Date : 2024-09-11 DOI: arxiv-2409.07368
Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen
This paper introduces SGCode, a flexible prompt-optimizing system to generatesecure code with large language models (LLMs). SGCode integrates recentprompt-optimization approaches with LLMs in a unified system accessible throughfront-end and back-end APIs, enabling users to 1) generate secure code, whichis free of vulnerabilities, 2) review and share security analysis, and 3)easily switch from one prompt optimization approach to another, while providinginsights on model and system performance. We populated SGCode on an AWS serverwith PromSec, an approach that optimizes prompts by combining an LLM andsecurity tools with a lightweight generative adversarial graph neural networkto detect and fix security vulnerabilities in the generated code. Extensiveexperiments show that SGCode is practical as a public tool to gain insightsinto the trade-offs between model utility, secure code generation, and systemcost. SGCode has only a marginal cost compared with prompting LLMs. SGCode isavailable at: http://3.131.141.63:8501/.
本文介绍了 SGCode,这是一种灵活的提示优化系统,可利用大型语言模型(LLM)生成安全代码。SGCode 将最新的提示优化方法与 LLM 集成在一个可通过前端和后端 API 访问的统一系统中,使用户能够:1)生成无漏洞的安全代码;2)审查和共享安全分析;3)轻松地从一种提示优化方法切换到另一种方法,同时提供有关模型和系统性能的见解。我们在 AWS 服务器上用 PromSec 填充了 SGCode,这种方法通过将 LLM 和安全工具与轻量级生成式对抗图神经网络相结合来优化提示,从而检测和修复生成代码中的安全漏洞。广泛的实验表明,SGCode 是一种实用的公共工具,可用于深入了解模型效用、安全代码生成和系统成本之间的权衡。与提示 LLM 相比,SGCode 的成本微不足道。SGCode 的网址是:http://3.131.141.63:8501/。
{"title":"Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code","authors":"Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen","doi":"arxiv-2409.07368","DOIUrl":"https://doi.org/arxiv-2409.07368","url":null,"abstract":"This paper introduces SGCode, a flexible prompt-optimizing system to generate\u0000secure code with large language models (LLMs). SGCode integrates recent\u0000prompt-optimization approaches with LLMs in a unified system accessible through\u0000front-end and back-end APIs, enabling users to 1) generate secure code, which\u0000is free of vulnerabilities, 2) review and share security analysis, and 3)\u0000easily switch from one prompt optimization approach to another, while providing\u0000insights on model and system performance. We populated SGCode on an AWS server\u0000with PromSec, an approach that optimizes prompts by combining an LLM and\u0000security tools with a lightweight generative adversarial graph neural network\u0000to detect and fix security vulnerabilities in the generated code. Extensive\u0000experiments show that SGCode is practical as a public tool to gain insights\u0000into the trade-offs between model utility, secure code generation, and system\u0000cost. SGCode has only a marginal cost compared with prompting LLMs. SGCode is\u0000available at: http://3.131.141.63:8501/.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
fence.t.s: Closing Timing Channels in High-Performance Out-of-Order Cores through ISA-Supported Temporal Partitioning fence.t.s:通过 ISA 支持的时序分区关闭高性能失序内核中的定时通道
Pub Date : 2024-09-11 DOI: arxiv-2409.07576
Nils Wistoff, Gernot Heiser, Luca Benini
Microarchitectural timing channels exploit information leakage betweensecurity domains that should be isolated, bypassing the operating system'ssecurity boundaries. These channels result from contention for sharedmicroarchitectural state. In the RISC-V instruction set, the temporal fenceinstruction (fence.t) was proposed to close timing channels by providing anoperating system with the means to temporally partition microarchitecturalstate inexpensively in simple in-order cores. This work explores challengeswith fence.t in superscalar out-of-order cores featuring large and pervasivemicroarchitectural state. To overcome these challenges, we propose a novelSW-supported temporal fence (fence.t.s), which reuses existing mechanisms andsupports advanced microarchitectural features, enabling full timing channelprotection of an exemplary out-of-order core (OpenC910) at negligible hardwarecosts and a minimal performance impact of 1.0 %.
微体系结构时序通道利用本应隔离的安全域之间的信息泄漏,绕过操作系统的安全边界。这些通道源于对共享微体系结构状态的争夺。在 RISC-V 指令集中,提出了时序栅栏指令 (fence.t),为操作系统提供了在简单的顺序内核中以低成本对微体系结构状态进行时序分区的方法,从而关闭了时序通道。本研究探讨了 fence.t 在超标量无序内核中面临的挑战,无序内核的特点是微体系结构状态庞大且无处不在。为了克服这些挑战,我们提出了一种新颖的、SW 支持的时序栅栏(fence.t.s),它重复利用现有机制并支持先进的微体系结构特性,以可忽略不计的硬件成本和 1.0% 的最小性能影响,实现了对一个示例无序内核(OpenC910)的完全时序通道保护。
{"title":"fence.t.s: Closing Timing Channels in High-Performance Out-of-Order Cores through ISA-Supported Temporal Partitioning","authors":"Nils Wistoff, Gernot Heiser, Luca Benini","doi":"arxiv-2409.07576","DOIUrl":"https://doi.org/arxiv-2409.07576","url":null,"abstract":"Microarchitectural timing channels exploit information leakage between\u0000security domains that should be isolated, bypassing the operating system's\u0000security boundaries. These channels result from contention for shared\u0000microarchitectural state. In the RISC-V instruction set, the temporal fence\u0000instruction (fence.t) was proposed to close timing channels by providing an\u0000operating system with the means to temporally partition microarchitectural\u0000state inexpensively in simple in-order cores. This work explores challenges\u0000with fence.t in superscalar out-of-order cores featuring large and pervasive\u0000microarchitectural state. To overcome these challenges, we propose a novel\u0000SW-supported temporal fence (fence.t.s), which reuses existing mechanisms and\u0000supports advanced microarchitectural features, enabling full timing channel\u0000protection of an exemplary out-of-order core (OpenC910) at negligible hardware\u0000costs and a minimal performance impact of 1.0 %.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification CLNX:为识别 C/C++ 漏洞贡献提交架起代码与自然语言的桥梁
Pub Date : 2024-09-11 DOI: arxiv-2409.07407
Zeqing Qin, Yiwei Wu, Lansheng Han
Large Language Models (LLMs) have shown great promise in vulnerabilityidentification. As C/C++ comprises half of the Open-Source Software (OSS)vulnerabilities over the past decade and updates in OSS mainly occur throughcommits, enhancing LLMs' ability to identify C/C++ Vulnerability-ContributingCommits (VCCs) is essential. However, current studies primarily focus onfurther pre-training LLMs on massive code datasets, which is resource-intensiveand poses efficiency challenges. In this paper, we enhance the ability ofBERT-based LLMs to identify C/C++ VCCs in a lightweight manner. We proposeCodeLinguaNexus (CLNX) as a bridge facilitating communication between C/C++programs and LLMs. Based on commits, CLNX efficiently converts the source codeinto a more natural representation while preserving key details. Specifically,CLNX first applies structure-level naturalization to decompose complexprograms, followed by token-level naturalization to interpret complex symbols.We evaluate CLNX on public datasets of 25,872 C/C++ functions with theircommits. The results show that CLNX significantly enhances the performance ofLLMs on identifying C/C++ VCCs. Moreover, CLNX-equipped CodeBERT achieves newstate-of-the-art and identifies 38 OSS vulnerabilities in the real world.
大型语言模型(LLMs)在漏洞识别方面显示了巨大的前景。在过去十年中,C/C++ 占据了开源软件(OSS)漏洞的半壁江山,而开源软件的更新主要是通过提交来实现的,因此提高 LLM 识别 C/C++ 漏洞提交(VCC)的能力至关重要。然而,目前的研究主要侧重于在海量代码数据集上对 LLM 进行进一步的预训练,这不仅耗费大量资源,而且在效率方面也存在挑战。在本文中,我们以轻量级的方式增强了基于 BERT 的 LLM 识别 C/C++ VCC 的能力。我们提出了代码语言联系(CodeLinguaNexus,CLNX)作为促进 C/C++ 程序与 LLM 之间交流的桥梁。基于提交,CLNX 可以高效地将源代码转换为更自然的表示形式,同时保留关键细节。具体来说,CLNX首先应用结构级归化来分解复杂程序,然后应用标记级归化来解释复杂符号。我们在包含25872个C/C++函数及其提交的公开数据集上对CLNX进行了评估。结果表明,CLNX 显著提高了LLMs 识别 C/C++ VCC 的性能。此外,配备 CLNX 的 CodeBERT 达到了最新水平,在现实世界中识别出了 38 个开放源码软件漏洞。
{"title":"CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification","authors":"Zeqing Qin, Yiwei Wu, Lansheng Han","doi":"arxiv-2409.07407","DOIUrl":"https://doi.org/arxiv-2409.07407","url":null,"abstract":"Large Language Models (LLMs) have shown great promise in vulnerability\u0000identification. As C/C++ comprises half of the Open-Source Software (OSS)\u0000vulnerabilities over the past decade and updates in OSS mainly occur through\u0000commits, enhancing LLMs' ability to identify C/C++ Vulnerability-Contributing\u0000Commits (VCCs) is essential. However, current studies primarily focus on\u0000further pre-training LLMs on massive code datasets, which is resource-intensive\u0000and poses efficiency challenges. In this paper, we enhance the ability of\u0000BERT-based LLMs to identify C/C++ VCCs in a lightweight manner. We propose\u0000CodeLinguaNexus (CLNX) as a bridge facilitating communication between C/C++\u0000programs and LLMs. Based on commits, CLNX efficiently converts the source code\u0000into a more natural representation while preserving key details. Specifically,\u0000CLNX first applies structure-level naturalization to decompose complex\u0000programs, followed by token-level naturalization to interpret complex symbols.\u0000We evaluate CLNX on public datasets of 25,872 C/C++ functions with their\u0000commits. The results show that CLNX significantly enhances the performance of\u0000LLMs on identifying C/C++ VCCs. Moreover, CLNX-equipped CodeBERT achieves new\u0000state-of-the-art and identifies 38 OSS vulnerabilities in the real world.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study 随时随地办公 (WFA) 的网络安全挑战分析和用户研究提出的建议
Pub Date : 2024-09-11 DOI: arxiv-2409.07567
Mohammed Mahyoub, Ashraf Matrawy, Kamal Isleem, Olakunle Ibitoye
Many organizations were forced to quickly transition to thework-from-anywhere (WFA) model as a necessity to continue with their operationsand remain in business despite the restrictions imposed during the COVID-19pandemic. Many decisions were made in a rush, and cybersecurity decency toolswere not in place to support this transition. In this paper, we first attemptto uncover some challenges and implications related to the cybersecurity of theWFA model. Secondly, we conducted an online user study to investigate thereadiness and cybersecurity awareness of employers and their employees whoshifted to work remotely from anywhere. The user study questionnaire addresseddifferent resilience perspectives of individuals and organizations. Thecollected data includes 45 responses from remotely working employees ofdifferent organizational types: universities, government, private, andnon-profit organizations. Despite the importance of security training andguidelines, it was surprising that many participants had not received them. Arobust communication strategy is necessary to ensure that employees areinformed and updated on security incidents that the organization encounters.Additionally, there is an increased need to pay attention to thesecurity-related attributes of employees, such as their behavior, awareness,and compliance. Finally, we outlined best practice recommendations andmitigation tips guided by the study results to help individuals andorganizations resist cybercrime and fraud and mitigate WFA-relatedcybersecurity risks.
尽管在 COVID-19 大流行期间实施了各种限制,但许多组织仍被迫迅速过渡到 "无处不在"(WFA)模式,以继续开展业务并保持经营。许多决策都是在匆忙中做出的,网络安全体面工具也没有到位,无法为这一过渡提供支持。在本文中,我们首先试图揭示与世界粮食计划署模式的网络安全相关的一些挑战和影响。其次,我们开展了一项在线用户研究,调查雇主及其员工在转向随时随地远程工作方面的准备情况和网络安全意识。用户研究调查问卷涉及个人和组织的不同复原力观点。收集到的数据包括来自不同组织类型(大学、政府、私营和非营利组织)远程工作员工的 45 份回复。尽管安全培训和指南非常重要,但令人惊讶的是,许多参与者并没有接受过这些培训和指南。此外,我们还需要更多地关注员工与安全相关的属性,如他们的行为、意识和合规性。最后,我们概述了以研究结果为指导的最佳实践建议和缓解提示,以帮助个人和组织抵御网络犯罪和欺诈,降低与 WFA 相关的网络安全风险。
{"title":"Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study","authors":"Mohammed Mahyoub, Ashraf Matrawy, Kamal Isleem, Olakunle Ibitoye","doi":"arxiv-2409.07567","DOIUrl":"https://doi.org/arxiv-2409.07567","url":null,"abstract":"Many organizations were forced to quickly transition to the\u0000work-from-anywhere (WFA) model as a necessity to continue with their operations\u0000and remain in business despite the restrictions imposed during the COVID-19\u0000pandemic. Many decisions were made in a rush, and cybersecurity decency tools\u0000were not in place to support this transition. In this paper, we first attempt\u0000to uncover some challenges and implications related to the cybersecurity of the\u0000WFA model. Secondly, we conducted an online user study to investigate the\u0000readiness and cybersecurity awareness of employers and their employees who\u0000shifted to work remotely from anywhere. The user study questionnaire addressed\u0000different resilience perspectives of individuals and organizations. The\u0000collected data includes 45 responses from remotely working employees of\u0000different organizational types: universities, government, private, and\u0000non-profit organizations. Despite the importance of security training and\u0000guidelines, it was surprising that many participants had not received them. A\u0000robust communication strategy is necessary to ensure that employees are\u0000informed and updated on security incidents that the organization encounters.\u0000Additionally, there is an increased need to pay attention to the\u0000security-related attributes of employees, such as their behavior, awareness,\u0000and compliance. Finally, we outlined best practice recommendations and\u0000mitigation tips guided by the study results to help individuals and\u0000organizations resist cybercrime and fraud and mitigate WFA-related\u0000cybersecurity risks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Deception: State of the art, Trends and Open challenges 网络欺骗:技术现状、趋势和公开挑战
Pub Date : 2024-09-11 DOI: arxiv-2409.07194
Pedro Beltrán López, Manuel Gil Pérez, Pantaleone Nespoli
The growing interest in cybersecurity has significantly increased articlesdesigning and implementing various Cyber Deception (CYDEC) mechanisms. Thistrend reflects the urgent need for new strategies to address cyber threatseffectively. Since its emergence, CYDEC has established itself as an innovativedefense against attackers, thanks to its proactive and reactive capabilities,finding applications in numerous real-life scenarios. Despite the considerablework devoted to CYDEC, the literature still presents significant gaps. Inparticular, there has not been (i) a comprehensive analysis of the maincomponents characterizing CYDEC, (ii) a generic classification covering alltypes of solutions, nor (iii) a survey of the current state of the literaturein various contexts. This article aims to fill these gaps through a detailedreview of the main features that comprise CYDEC, developing a comprehensiveclassification taxonomy. In addition, the different frameworks used to generateCYDEC are reviewed, presenting a more comprehensive one. Existing solutions inthe literature using CYDEC, both without Artificial Intelligence (AI) and withAI, are studied and compared. Finally, the most salient trends of the currentstate of the art are discussed, offering a list of pending challenges forfuture research.
人们对网络安全的兴趣与日俱增,设计和实施各种网络欺骗(CYDEC)机制的文章也大幅增加。这一趋势反映了人们迫切需要新的战略来有效地应对网络威胁。自出现以来,网络欺骗(CYDEC)凭借其主动和被动的能力,已成为抵御攻击者的创新防御手段,并在众多现实生活场景中得到应用。尽管在 CYDEC 方面做了大量工作,但相关文献仍存在很大差距。尤其是:(i) 对 CYDEC 主要特征的全面分析;(ii) 涵盖所有类型解决方案的通用分类;(iii) 不同背景下文献现状的调查。本文旨在通过详细审查 CYDEC 的主要特征,制定一个全面的分类标准,从而填补这些空白。此外,本文还对用于生成 CYDEC 的不同框架进行了回顾,从而提出了一个更为全面的框架。研究并比较了文献中使用 CYDEC 的现有解决方案,包括无人工智能(AI)和有人工智能的解决方案。最后,讨论了当前技术最突出的趋势,并提出了未来研究面临的挑战清单。
{"title":"Cyber Deception: State of the art, Trends and Open challenges","authors":"Pedro Beltrán López, Manuel Gil Pérez, Pantaleone Nespoli","doi":"arxiv-2409.07194","DOIUrl":"https://doi.org/arxiv-2409.07194","url":null,"abstract":"The growing interest in cybersecurity has significantly increased articles\u0000designing and implementing various Cyber Deception (CYDEC) mechanisms. This\u0000trend reflects the urgent need for new strategies to address cyber threats\u0000effectively. Since its emergence, CYDEC has established itself as an innovative\u0000defense against attackers, thanks to its proactive and reactive capabilities,\u0000finding applications in numerous real-life scenarios. Despite the considerable\u0000work devoted to CYDEC, the literature still presents significant gaps. In\u0000particular, there has not been (i) a comprehensive analysis of the main\u0000components characterizing CYDEC, (ii) a generic classification covering all\u0000types of solutions, nor (iii) a survey of the current state of the literature\u0000in various contexts. This article aims to fill these gaps through a detailed\u0000review of the main features that comprise CYDEC, developing a comprehensive\u0000classification taxonomy. In addition, the different frameworks used to generate\u0000CYDEC are reviewed, presenting a more comprehensive one. Existing solutions in\u0000the literature using CYDEC, both without Artificial Intelligence (AI) and with\u0000AI, are studied and compared. Finally, the most salient trends of the current\u0000state of the art are discussed, offering a list of pending challenges for\u0000future research.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer Websites 分析从问答网站复制粘贴有漏洞的 Solidity 代码片段的影响
Pub Date : 2024-09-11 DOI: arxiv-2409.07586
Konrad Weiss, Christof Ferreira Torres, Florian Wendland
Ethereum smart contracts are executable programs deployed on a blockchain.Once deployed, they cannot be updated due to their inherent immutability.Moreover, they often manage valuable assets that are worth millions of dollars,making them attractive targets for attackers. The introduction ofvulnerabilities in programs due to the reuse of vulnerable code posted on Q&Awebsites such as Stack Overflow is not a new issue. However, little effort hasbeen made to analyze the extent of this issue on deployed smart contracts. Inthis paper, we conduct a study on the impact of vulnerable code reuse from Q&Awebsites during the development of smart contracts and provide tools uniquelyfit to detect vulnerable code patterns in complete and incomplete SmartContract code. This paper proposes a pattern-based vulnerability detection toolthat is able to analyze code snippets (i.e., incomplete code) as well as fullsmart contracts based on the concept of code property graphs. We also propose amethodology that leverages fuzzy hashing to quickly detect code clones ofvulnerable snippets among deployed smart contracts. Our results show that ourvulnerability search, as well as our code clone detection, are comparable tostate-of-the-art while being applicable to code snippets. Our large-scale studyon 18,660 code snippets reveals that 4,596 of them are vulnerable, out of which616 can be found in 7,852 deployed smart contracts. These results highlightthat the reuse of vulnerable code snippets is indeed an issue in currentlydeployed smart contracts.
以太坊智能合约是部署在区块链上的可执行程序。一旦部署,由于其固有的不可更改性,它们就无法更新。此外,它们通常管理着价值数百万美元的宝贵资产,因此对攻击者来说是极具吸引力的目标。由于重复使用发布在 Stack Overflow 等问答网站上的漏洞代码,程序中出现漏洞并不是一个新问题。然而,人们很少努力分析这一问题在已部署的智能合约中的影响程度。在本文中,我们对智能合约开发过程中重复使用问答网站上的漏洞代码所造成的影响进行了研究,并提供了独特的工具来检测完整和不完整智能合约代码中的漏洞代码模式。本文提出了一种基于模式的漏洞检测工具,它能够分析代码片段(即不完整代码)以及基于代码属性图概念的完整智能合约。我们还提出了一种方法,利用模糊哈希算法快速检测已部署智能合约中存在漏洞的代码片段的代码克隆。我们的研究结果表明,我们的漏洞搜索和代码克隆检测与最先进的方法不相上下,同时适用于代码片段。我们对 18,660 个代码片段进行的大规模研究显示,其中 4,596 个存在漏洞,其中 616 个可以在 7,852 个已部署的智能合约中找到。这些结果突出表明,在当前部署的智能合约中,重复使用易受攻击的代码片段确实是一个问题。
{"title":"Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer Websites","authors":"Konrad Weiss, Christof Ferreira Torres, Florian Wendland","doi":"arxiv-2409.07586","DOIUrl":"https://doi.org/arxiv-2409.07586","url":null,"abstract":"Ethereum smart contracts are executable programs deployed on a blockchain.\u0000Once deployed, they cannot be updated due to their inherent immutability.\u0000Moreover, they often manage valuable assets that are worth millions of dollars,\u0000making them attractive targets for attackers. The introduction of\u0000vulnerabilities in programs due to the reuse of vulnerable code posted on Q&A\u0000websites such as Stack Overflow is not a new issue. However, little effort has\u0000been made to analyze the extent of this issue on deployed smart contracts. In\u0000this paper, we conduct a study on the impact of vulnerable code reuse from Q&A\u0000websites during the development of smart contracts and provide tools uniquely\u0000fit to detect vulnerable code patterns in complete and incomplete Smart\u0000Contract code. This paper proposes a pattern-based vulnerability detection tool\u0000that is able to analyze code snippets (i.e., incomplete code) as well as full\u0000smart contracts based on the concept of code property graphs. We also propose a\u0000methodology that leverages fuzzy hashing to quickly detect code clones of\u0000vulnerable snippets among deployed smart contracts. Our results show that our\u0000vulnerability search, as well as our code clone detection, are comparable to\u0000state-of-the-art while being applicable to code snippets. Our large-scale study\u0000on 18,660 code snippets reveals that 4,596 of them are vulnerable, out of which\u0000616 can be found in 7,852 deployed smart contracts. These results highlight\u0000that the reuse of vulnerable code snippets is indeed an issue in currently\u0000deployed smart contracts.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting Static Feature-Based Android Malware Detection 重新审视基于静态特征的安卓恶意软件检测
Pub Date : 2024-09-11 DOI: arxiv-2409.07397
Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi
The increasing reliance on machine learning (ML) in computer security,particularly for malware classification, has driven significant advancements.However, the replicability and reproducibility of these results are oftenoverlooked, leading to challenges in verifying research findings. This paperhighlights critical pitfalls that undermine the validity of ML research inAndroid malware detection, focusing on dataset and methodological issues. Wecomprehensively analyze Android malware detection using two datasets and assessoffline and continual learning settings with six widely used ML models. Ourstudy reveals that when properly tuned, simpler baseline methods can oftenoutperform more complex models. To address reproducibility challenges, wepropose solutions for improving datasets and methodological practices, enablingfairer model comparisons. Additionally, we open-source our code to facilitatemalware analysis, making it extensible for new models and datasets. Our paperaims to support future research in Android malware detection and other securitydomains, enhancing the reliability and reproducibility of published results.
计算机安全领域对机器学习(ML)的依赖与日俱增,尤其是在恶意软件分类方面,推动了计算机安全领域的重大进步。然而,这些成果的可复制性和可再现性往往被忽视,导致在验证研究成果方面面临挑战。本文重点讨论了数据集和方法问题,指出了影响安卓恶意软件检测中人工智能研究有效性的关键陷阱。我们使用两个数据集对 Android 恶意软件检测进行了全面分析,并对六种广泛使用的 ML 模型的离线和持续学习设置进行了评估。我们的研究表明,如果调整得当,较简单的基线方法往往能胜过较复杂的模型。为了应对可重复性挑战,我们提出了改进数据集和方法实践的解决方案,从而能够进行更公平的模型比较。此外,我们还将代码开源,以方便软件分析,使其可扩展到新的模型和数据集。我们的论文旨在支持未来在安卓恶意软件检测和其他安全领域的研究,提高已发布结果的可靠性和可重复性。
{"title":"Revisiting Static Feature-Based Android Malware Detection","authors":"Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi","doi":"arxiv-2409.07397","DOIUrl":"https://doi.org/arxiv-2409.07397","url":null,"abstract":"The increasing reliance on machine learning (ML) in computer security,\u0000particularly for malware classification, has driven significant advancements.\u0000However, the replicability and reproducibility of these results are often\u0000overlooked, leading to challenges in verifying research findings. This paper\u0000highlights critical pitfalls that undermine the validity of ML research in\u0000Android malware detection, focusing on dataset and methodological issues. We\u0000comprehensively analyze Android malware detection using two datasets and assess\u0000offline and continual learning settings with six widely used ML models. Our\u0000study reveals that when properly tuned, simpler baseline methods can often\u0000outperform more complex models. To address reproducibility challenges, we\u0000propose solutions for improving datasets and methodological practices, enabling\u0000fairer model comparisons. Additionally, we open-source our code to facilitate\u0000malware analysis, making it extensible for new models and datasets. Our paper\u0000aims to support future research in Android malware detection and other security\u0000domains, enhancing the reliability and reproducibility of published results.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New constructions of pseudorandom codes 伪随机码的新构造
Pub Date : 2024-09-11 DOI: arxiv-2409.07580
Surendra Ghentiyala, Venkatesan Guruswami
Introduced in [CG24], pseudorandom error-correcting codes (PRCs) are a newcryptographic primitive with applications in watermarking generative AI models.These are codes where a collection of polynomially many codewords iscomputationally indistinguishable from random, except to individuals with thedecoding key. In this work, we examine the assumptions under which PRCs withrobustness to a constant error rate exist. 1. We show that if both the planted hyperloop assumption introduced in[BKR23] and security of a version of Goldreich's PRG hold, then there existpublic-key PRCs for which no efficient adversary can distinguish a polynomialnumber of codewords from random with better than $o(1)$ advantage. 2. We revisit the construction of [CG24] and show that it can be based on awider range of assumptions than presented in [CG24]. To do this, we introduce aweakened version of the planted XOR assumption which we call the weak plantedXOR assumption and which may be of independent interest. 3. We initiate the study of PRCs which are secure against space-boundedadversaries. We show how to construct secret-key PRCs of length $O(n)$ whichare $textit{unconditionally}$ indistinguishable from random by$text{poly}(n)$ time, $O(n^{1.5-varepsilon})$ space adversaries.
伪随机纠错码(PRC)是在 [CG24] 中提出的一种新的加密原语,可应用于生成式人工智能模型的水印。在这项工作中,我们研究了具有恒定错误率稳健性的 PRC 存在的假设条件。1.我们证明,如果[BKR23]中引入的种植超环假设和 Goldreich 的 PRG 版本的安全性都成立,那么就存在这样的公钥 PRC:没有有效的对手能以优于 $o(1)$ 的优势从随机中区分出多项式数量的编码词。2.我们重温了 [CG24] 的构造,并证明它可以基于比 [CG24] 更广泛的假设。为此,我们引入了种植 XOR 假设的弱化版本,我们称之为弱种植 XOR 假设,它可能会引起独立的兴趣。3.我们开始研究可安全对抗空间边界对抗的 PRC。我们展示了如何构造长度为 $O(n)$的秘钥 PRCs,这些 PRCs 在 $O(n^{1.5varepsilon})$ 空间对手的 $/text{poly}(n)$ 时间内是 $/textit{unconditionally}$ 与随机密钥不可区分的。
{"title":"New constructions of pseudorandom codes","authors":"Surendra Ghentiyala, Venkatesan Guruswami","doi":"arxiv-2409.07580","DOIUrl":"https://doi.org/arxiv-2409.07580","url":null,"abstract":"Introduced in [CG24], pseudorandom error-correcting codes (PRCs) are a new\u0000cryptographic primitive with applications in watermarking generative AI models.\u0000These are codes where a collection of polynomially many codewords is\u0000computationally indistinguishable from random, except to individuals with the\u0000decoding key. In this work, we examine the assumptions under which PRCs with\u0000robustness to a constant error rate exist. 1. We show that if both the planted hyperloop assumption introduced in\u0000[BKR23] and security of a version of Goldreich's PRG hold, then there exist\u0000public-key PRCs for which no efficient adversary can distinguish a polynomial\u0000number of codewords from random with better than $o(1)$ advantage. 2. We revisit the construction of [CG24] and show that it can be based on a\u0000wider range of assumptions than presented in [CG24]. To do this, we introduce a\u0000weakened version of the planted XOR assumption which we call the weak planted\u0000XOR assumption and which may be of independent interest. 3. We initiate the study of PRCs which are secure against space-bounded\u0000adversaries. We show how to construct secret-key PRCs of length $O(n)$ which\u0000are $textit{unconditionally}$ indistinguishable from random by\u0000$text{poly}(n)$ time, $O(n^{1.5-varepsilon})$ space adversaries.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS 引入可扰动性评分(Perturb-ability Score,PS)以增强 ML-NIDS 抵抗逃避式恶意攻击的鲁棒性
Pub Date : 2024-09-11 DOI: arxiv-2409.07448
Mohamed elShehaby, Ashraf Matrawy
This paper proposes a novel Perturb-ability Score (PS) that can be used toidentify Network Intrusion Detection Systems (NIDS) features that can be easilymanipulated by attackers in the problem-space. We demonstrate that using PS toselect only non-perturb-able features for ML-based NIDS maintains detectionperformance while enhancing robustness against adversarial attacks.
本文提出了一种新颖的可扰动性评分(Perturb-ability Score,PS),可用于识别问题空间中容易被攻击者操纵的网络入侵检测系统(NIDS)特征。我们证明,使用 PS 只为基于 ML 的网络入侵检测系统选择不可扰动特征,既能保持检测性能,又能增强对抗恶意攻击的鲁棒性。
{"title":"Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS","authors":"Mohamed elShehaby, Ashraf Matrawy","doi":"arxiv-2409.07448","DOIUrl":"https://doi.org/arxiv-2409.07448","url":null,"abstract":"This paper proposes a novel Perturb-ability Score (PS) that can be used to\u0000identify Network Intrusion Detection Systems (NIDS) features that can be easily\u0000manipulated by attackers in the problem-space. We demonstrate that using PS to\u0000select only non-perturb-able features for ML-based NIDS maintains detection\u0000performance while enhancing robustness against adversarial attacks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Cryptography and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1