首页 > 最新文献

ACM Transactions on Privacy and Security最新文献

英文 中文
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned 第一资本数据泄露的系统分析:吸取的重要教训
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-07 DOI: https://dl.acm.org/doi/10.1145/3546068
Shaharyar Khan, Ilya Kabanov, Yunke Hua, Stuart Madnick

The 2019 Capital One data breach was one of the largest data breaches impacting the privacy and security of personal information of over a 100 million individuals. In most reports about a cyberattack, you will often hear that it succeeded because a single employee clicked on a link in a phishing email or forgot to patch some software, making it seem like an isolated, one-off, trivial problem involving maybe one person, committing a mistake or being negligent. But that is usually not the complete story. By ignoring the related managerial and organizational failures, you are leaving in place the conditions for the next breach. Using our Cybersafety analysis methodology, we identified control failures spanning control levels, going from rather technical issues up to top management, the Board of Directors, and Government regulators. In this analysis, we reconstruct the Capital One hierarchical cyber safety control structure, identify what parts failed and why, and provide recommendations for improvements. This work demonstrates how to discover the true causes of security failures in complex information systems and derive systematic cybersecurity improvements that likely apply to many other organizations. It also provides an approach that individuals can use to evaluate and better secure their organizations.

2019年Capital One数据泄露事件是影响超过1亿人个人信息隐私和安全的最大数据泄露事件之一。在大多数关于网络攻击的报道中,你经常会听到攻击之所以成功,是因为一名员工点击了网络钓鱼邮件中的链接,或者忘记给某些软件打补丁,这让它看起来像是一个孤立的、一次性的、微不足道的问题,可能只是一个人犯了错误或疏忽所致。但这通常不是故事的全部。如果忽视相关的管理和组织失误,你就会为下一次违规行为留下条件。使用我们的网络安全分析方法,我们确定了跨越控制级别的控制故障,从相当技术性的问题一直到最高管理层、董事会和政府监管机构。在本分析中,我们重建了Capital One的分层网络安全控制结构,确定了失败的部分及其原因,并提出了改进建议。这项工作演示了如何发现复杂信息系统中安全故障的真正原因,并推导出可能适用于许多其他组织的系统网络安全改进。它还提供了一种方法,个人可以使用它来评估和更好地保护他们的组织。
{"title":"A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned","authors":"Shaharyar Khan, Ilya Kabanov, Yunke Hua, Stuart Madnick","doi":"https://dl.acm.org/doi/10.1145/3546068","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3546068","url":null,"abstract":"<p>The 2019 Capital One data breach was one of the largest data breaches impacting the privacy and security of personal information of over a 100 million individuals. In most reports about a cyberattack, you will often hear that it succeeded because a single employee clicked on a link in a phishing email or forgot to patch some software, making it seem like an isolated, one-off, trivial problem involving maybe one person, committing a mistake or being negligent. But that is usually not the complete story. By ignoring the related managerial and organizational failures, you are leaving in place the conditions for the next breach. Using our Cybersafety analysis methodology, we identified control failures spanning control levels, going from rather technical issues up to top management, the Board of Directors, and Government regulators. In this analysis, we reconstruct the Capital One hierarchical cyber safety control structure, identify what parts failed and why, and provide recommendations for improvements. This work demonstrates how to discover the true causes of security failures in complex information systems and derive systematic cybersecurity improvements that likely apply to many other organizations. It also provides an approach that individuals can use to evaluate and better secure their organizations.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"36 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Real-Time Release of Sequential Data 差分私有串行数据实时释放
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-07 DOI: https://dl.acm.org/doi/10.1145/3544837
Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu

Many data analytics applications rely on temporal data, generated (and possibly acquired) sequentially for online analysis. How to release this type of data in a privacy-preserving manner is of great interest and more challenging than releasing one-time, static data. Because of the (potentially strong) temporal correlation within the data sequence, the overall privacy loss can accumulate significantly over time; an attacker with statistical knowledge of the correlation can be particularly hard to defend against. An idea that has been explored in the literature to mitigate this problem is to factor this correlation into the perturbation/noise mechanism. Existing work, however, either focuses on the offline setting (where perturbation is designed and introduced after the entire sequence has become available), or requires a priori information on the correlation in generating perturbation. In this study we propose an approach where the correlation is learned as the sequence is generated, and is used for estimating future data in the sequence. This estimate then drives the generation of the noisy released data. This method allows us to design better perturbation and is suitable for real-time operations. Using the notion of differential privacy, we show this approach achieves high accuracy with lower privacy loss compared to existing methods.

许多数据分析应用程序依赖于时序数据,这些数据是为了在线分析而顺序生成的(也可能是获取的)。如何以保护隐私的方式发布这类数据非常有趣,而且比发布一次性静态数据更具挑战性。由于数据序列中的时间相关性(可能很强),随着时间的推移,整体隐私损失可能会显著累积;具有相关统计知识的攻击者尤其难以防御。为了缓解这一问题,文献中已经探索了一个想法,即将这种相关性纳入扰动/噪声机制。然而,现有的工作要么关注离线设置(在整个序列变得可用之后设计和引入扰动),要么需要关于产生扰动的相关性的先验信息。在本研究中,我们提出了一种方法,其中相关性是在序列生成时学习的,并用于估计序列中的未来数据。然后,这个估计驱动了噪声释放数据的生成。这种方法使我们能够设计出更好的摄动,并且适合于实时操作。利用差分隐私的概念,我们证明了与现有方法相比,该方法具有较高的准确性和较低的隐私损失。
{"title":"Differentially Private Real-Time Release of Sequential Data","authors":"Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu","doi":"https://dl.acm.org/doi/10.1145/3544837","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3544837","url":null,"abstract":"<p>Many data analytics applications rely on temporal data, generated (and possibly acquired) sequentially for online analysis. How to release this type of data in a privacy-preserving manner is of great interest and more challenging than releasing one-time, static data. Because of the (potentially strong) temporal correlation within the data sequence, the overall privacy loss can accumulate significantly over time; an attacker with statistical knowledge of the correlation can be particularly hard to defend against. An idea that has been explored in the literature to mitigate this problem is to factor this correlation into the perturbation/noise mechanism. Existing work, however, either focuses on the offline setting (where perturbation is designed and introduced after the entire sequence has become available), or requires <i>a priori</i> information on the correlation in generating perturbation. In this study we propose an approach where the correlation is learned as the sequence is generated, and is used for estimating future data in the sequence. This estimate then drives the generation of the noisy released data. This method allows us to design better perturbation and is suitable for real-time operations. Using the notion of differential privacy, we show this approach achieves high accuracy with lower privacy loss compared to existing methods.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"191 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks 基于社会对抗性攻击的锚链接预测跨网络嵌入
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-07 DOI: https://dl.acm.org/doi/10.1145/3548685
Huanran Wang, Wu Yang, Wei Wang, Dapeng Man, Jiguang Lv

Anchor link prediction across social networks plays an important role in multiple social network analysis. Traditional methods rely heavily on user privacy information or high-quality network topology information. These methods are not suitable for multiple social networks analysis in real-life. Deep learning methods based on graph embedding are restricted by the impact of the active privacy protection policy of users on the graph structure. In this paper, we propose a novel method which neutralizes the impact of users’ evasion strategies. First, graph embedding with conditional estimation analysis is used to obtain a robust embedding vector space. Secondly, cross-network features space for supervised learning is constructed via the constraints of cross-network feature collisions. The combination of robustness enhancement and cross-network feature collisions constraints eliminate the impact of evasion strategies. Extensive experiments on large-scale real-life social networks demonstrate that the proposed method significantly outperforms the state-of-the-art methods in terms of precision, adaptability, and robustness for the scenarios with evasion strategies.

跨社交网络的锚链接预测在多社交网络分析中起着重要作用。传统方法严重依赖于用户隐私信息或高质量的网络拓扑信息。这些方法不适用于现实生活中的多重社会网络分析。基于图嵌入的深度学习方法受到用户主动隐私保护策略对图结构影响的限制。在本文中,我们提出了一种新的方法来中和用户逃避策略的影响。首先,利用条件估计分析的图嵌入方法获得鲁棒嵌入向量空间;其次,通过跨网络特征碰撞约束构造监督学习的跨网络特征空间;鲁棒性增强和跨网络特征冲突约束的结合消除了规避策略的影响。在大规模现实社会网络上的大量实验表明,该方法在具有逃避策略的情况下,在精度、适应性和鲁棒性方面明显优于最先进的方法。
{"title":"A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks","authors":"Huanran Wang, Wu Yang, Wei Wang, Dapeng Man, Jiguang Lv","doi":"https://dl.acm.org/doi/10.1145/3548685","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3548685","url":null,"abstract":"<p>Anchor link prediction across social networks plays an important role in multiple social network analysis. Traditional methods rely heavily on user privacy information or high-quality network topology information. These methods are not suitable for multiple social networks analysis in real-life. Deep learning methods based on graph embedding are restricted by the impact of the active privacy protection policy of users on the graph structure. In this paper, we propose a novel method which neutralizes the impact of users’ evasion strategies. First, graph embedding with conditional estimation analysis is used to obtain a robust embedding vector space. Secondly, cross-network features space for supervised learning is constructed via the constraints of cross-network feature collisions. The combination of robustness enhancement and cross-network feature collisions constraints eliminate the impact of evasion strategies. Extensive experiments on large-scale real-life social networks demonstrate that the proposed method significantly outperforms the state-of-the-art methods in terms of precision, adaptability, and robustness for the scenarios with evasion strategies.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"64 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study 用户想从云删除和他们需要的信息:一个参与式行动研究
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-07 DOI: https://dl.acm.org/doi/10.1145/3546578
Kopo Marvin Ramokapane, Jose Such, Awais Rashid

Current cloud deletion mechanisms fall short in meeting users’ various deletion needs. They assume all data is deleted the same way—data is temporally removed (or hidden) from users’ cloud accounts before being completely deleted. This assumption neglects users’ desire to have data completely deleted instantly or their preference to have it recoverable for a more extended period. To date, these preferences have not been explored. To address this gap, we conducted a participatory study with four groups of active cloud users (five subjects per group). We examined their deletion preferences and the information they require to aid deletion. In particular, we explored how users want to delete cloud data and identify what information about cloud deletion they consider essential, the time it should be made available to them, and the communication channel that should be used. We show that cloud deletion preferences are complex and multi-dimensional, varying between subjects and groups. Information about deletion should be within reach when needed, for instance, be part of deletion controls. Based on these findings, we discuss the implications of our study in improving the current deletion mechanism to accommodate these preferences.

目前的云删除机制无法满足用户的各种删除需求。他们假设所有数据都以同样的方式删除——在完全删除之前,数据暂时从用户的云帐户中删除(或隐藏)。这个假设忽略了用户希望立即完全删除数据的愿望,或者他们希望在更长的时间内恢复数据的愿望。到目前为止,这些偏好还没有被探索过。为了解决这一差距,我们对四组活跃的云用户(每组五名受试者)进行了一项参与性研究。我们检查了他们的删除偏好和他们需要帮助删除的信息。特别是,我们探讨了用户希望如何删除云数据,并确定他们认为哪些关于云删除的信息是必要的,应该向他们提供这些信息的时间,以及应该使用的沟通渠道。我们表明,云删除偏好是复杂和多维的,在受试者和群体之间有所不同。有关删除的信息应该在需要时触手可及,例如,作为删除控件的一部分。基于这些发现,我们讨论了我们的研究在改进当前的删除机制以适应这些偏好方面的意义。
{"title":"What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study","authors":"Kopo Marvin Ramokapane, Jose Such, Awais Rashid","doi":"https://dl.acm.org/doi/10.1145/3546578","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3546578","url":null,"abstract":"<p>Current cloud deletion mechanisms fall short in meeting users’ various deletion needs. They assume all data is deleted the same way—data is temporally removed (or hidden) from users’ cloud accounts before being completely deleted. This assumption neglects users’ desire to have data completely deleted instantly or their preference to have it recoverable for a more extended period. To date, these preferences have not been explored. To address this gap, we conducted a participatory study with four groups of active cloud users (five subjects per group). We examined their deletion preferences and the information they require to aid deletion. In particular, we explored how users want to delete cloud data and identify what information about cloud deletion they consider essential, the time it should be made available to them, and the communication channel that should be used. We show that cloud deletion preferences are complex and multi-dimensional, varying between subjects and groups. Information about deletion should be within reach when needed, for instance, be part of deletion controls. Based on these findings, we discuss the implications of our study in improving the current deletion mechanism to accommodate these preferences.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"2 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference DeviceWatch:一种数据驱动的网络分析方法,通过图推理来识别受损的移动设备
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-07 DOI: https://dl.acm.org/doi/10.1145/3558767
Euijin Choo, Mohamed Nabeel, Mashael Alsabah, Issa Khalil, Ting Yu, Wei Wang

We propose to identify compromised mobile devices from a network administrator’s point of view. Intuitively, inadvertent users (and thus their devices) who download apps through untrustworthy markets are often lured to install malicious apps through in-app advertisements or phishing. We thus hypothesize that devices sharing similar apps would have a similar likelihood of being compromised, resulting in an association between a compromised device and its apps. We propose to leverage such associations to identify unknown compromised devices using the guilt-by-association principle. Admittedly, such associations could be relatively weak as it is hard, if not impossible, for an app to automatically download and install other apps without explicit user initiation. We describe how we can magnify such associations by carefully choosing parameters when applying graph-based inferences. We empirically evaluate the effectiveness of our approach on real datasets provided by a major mobile service provider. Specifically, we show that our approach achieves nearly 98% AUC (area under the ROC curve) and further detects as many as 6 ~ 7 times of new compromised devices not covered by the ground truth by expanding the limited knowledge on known devices. We show that the newly detected devices indeed present undesirable behavior in terms of leaking private information and accessing risky IPs and domains. We further conduct in-depth analysis of the effectiveness of graph inferences to understand the unique structure of the associations between mobile devices and their apps, and its impact on graph inferences, based on which we propose how to choose key parameters.

我们建议从网络管理员的角度来识别受损的移动设备。从直觉上看,通过不可信的市场下载应用程序的无意用户(以及他们的设备)经常被应用内广告或网络钓鱼引诱安装恶意应用程序。因此,我们假设共享类似应用程序的设备也有类似的被入侵可能性,从而导致被入侵的设备与其应用程序之间存在关联。我们建议利用这种关联来识别未知的受损设备,使用关联内疚原则。诚然,这种关联可能相对较弱,因为如果没有明确的用户启动,应用程序很难(如果不是不可能的话)自动下载和安装其他应用程序。我们描述了在应用基于图的推断时,如何通过仔细选择参数来放大这种关联。我们对一家主要移动服务提供商提供的真实数据集的有效性进行了实证评估。具体来说,我们表明我们的方法实现了近98%的AUC (ROC曲线下的面积),并通过扩展对已知设备的有限知识,进一步检测到多达6 ~ 7倍的未被基本事实覆盖的新受损设备。我们表明,新检测到的设备确实在泄露私人信息和访问风险ip和域方面存在不良行为。我们进一步深入分析了图推理的有效性,以了解移动设备与其应用之间关联的独特结构及其对图推理的影响,并在此基础上提出了如何选择关键参数的建议。
{"title":"DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference","authors":"Euijin Choo, Mohamed Nabeel, Mashael Alsabah, Issa Khalil, Ting Yu, Wei Wang","doi":"https://dl.acm.org/doi/10.1145/3558767","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3558767","url":null,"abstract":"<p>We propose to identify compromised mobile devices from a network administrator’s point of view. Intuitively, inadvertent users (and thus their devices) who download apps through untrustworthy markets are often lured to install malicious apps through in-app advertisements or phishing. We thus hypothesize that devices sharing similar apps would have a similar likelihood of being compromised, resulting in an association between a compromised device and its apps. We propose to leverage such associations to identify unknown compromised devices using the guilt-by-association principle. Admittedly, such associations could be relatively weak as it is hard, if not impossible, for an app to automatically download and install other apps without explicit user initiation. We describe how we can magnify such associations by carefully choosing parameters when applying graph-based inferences. We empirically evaluate the effectiveness of our approach on real datasets provided by a major mobile service provider. Specifically, we show that our approach achieves nearly 98% <b>AUC (area under the ROC curve)</b> and further detects as many as 6 ~ 7 times of new compromised devices not covered by the ground truth by expanding the limited knowledge on known devices. We show that the newly detected devices indeed present undesirable behavior in terms of leaking private information and accessing risky IPs and domains. We further conduct in-depth analysis of the effectiveness of graph inferences to understand the unique structure of the associations between mobile devices and their apps, and its impact on graph inferences, based on which we propose how to choose key parameters.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"3 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Paralinguistic Privacy Protection at the Edge 边缘的副语言隐私保护
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-03 DOI: https://dl.acm.org/doi/10.1145/3570161
Ranya Aloufi, Hamed Haddadi, David Boyle

Voice user interfaces and digital assistants are rapidly entering our lives and becoming singular touch points spanning our devices. These always-on services capture and transmit our audio data to powerful cloud services for further processing and subsequent actions. Our voices and raw audio signals collected through these devices contain a host of sensitive paralinguistic information that is transmitted to service providers regardless of deliberate or false triggers. As our emotional patterns and sensitive attributes like our identity, gender, well-being, are easily inferred using deep acoustic models, we encounter a new generation of privacy risks by using these services. One approach to mitigate the risk of paralinguistic-based privacy breaches is to exploit a combination of cloud-based processing with privacy-preserving, on-device paralinguistic information learning and filtering before transmitting voice data.

In this paper we introduce EDGY, a configurable, lightweight, disentangled representation learning framework that transforms and filters high-dimensional voice data to identify and contain sensitive attributes at the edge prior to offloading to the cloud. We evaluate EDGY’s on-device performance and explore optimization techniques, including model quantization and knowledge distillation, to enable private, accurate and efficient representation learning on resource-constrained devices. Our results show that EDGY runs in tens of milliseconds with 0.2% relative improvement in ‘zero-shot’ ABX score or minimal performance penalties of approximately 5.95% word error rate (WER) in learning linguistic representations from raw voice signals, using a CPU and a single-core ARM processor without specialized hardware.

语音用户界面和数字助理正在迅速进入我们的生活,并成为跨越我们设备的单一接触点。这些始终在线的服务捕获并将我们的音频数据传输到强大的云服务,以进行进一步处理和后续操作。通过这些设备收集的我们的声音和原始音频信号包含大量敏感的副语言信息,无论是否有意或虚假触发,这些信息都会传输给服务提供商。由于我们的情感模式和敏感属性,如我们的身份、性别、幸福感,很容易通过深层声学模型推断出来,我们在使用这些服务时遇到了新一代的隐私风险。减轻基于副语言的隐私泄露风险的一种方法是在传输语音数据之前,将基于云的处理与隐私保护、设备上的副语言信息学习和过滤相结合。在本文中,我们介绍了EDGY,这是一个可配置的、轻量级的、解纠缠的表示学习框架,它可以转换和过滤高维语音数据,以便在卸载到云之前识别和包含边缘的敏感属性。我们评估了EDGY在设备上的性能,并探索了优化技术,包括模型量化和知识蒸馏,以便在资源受限的设备上实现私有、准确和高效的表示学习。我们的结果表明,EDGY在几十毫秒内运行,在“零射击”ABX分数方面相对提高0.2%,或者在使用CPU和单核ARM处理器而没有专门硬件的情况下,从原始语音信号中学习语言表示时,单词错误率(WER)的最小性能损失约为5.95%。
{"title":"Paralinguistic Privacy Protection at the Edge","authors":"Ranya Aloufi, Hamed Haddadi, David Boyle","doi":"https://dl.acm.org/doi/10.1145/3570161","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3570161","url":null,"abstract":"<p>Voice user interfaces and digital assistants are rapidly entering our lives and becoming singular touch points spanning our devices. These <i>always-on</i> services capture and transmit our audio data to powerful cloud services for further processing and subsequent actions. Our voices and raw audio signals collected through these devices contain a host of sensitive paralinguistic information that is transmitted to service providers regardless of deliberate or false triggers. As our emotional patterns and sensitive attributes like our identity, gender, well-being, are easily inferred using deep acoustic models, we encounter a new generation of privacy risks by using these services. One approach to mitigate the risk of paralinguistic-based privacy breaches is to exploit a combination of cloud-based processing with privacy-preserving, on-device paralinguistic information learning and filtering before transmitting voice data. </p><p>In this paper we introduce <i>EDGY</i>, a configurable, lightweight, disentangled representation learning framework that transforms and filters high-dimensional voice data to identify and contain sensitive attributes at the edge prior to offloading to the cloud. We evaluate EDGY’s on-device performance and explore optimization techniques, including model quantization and knowledge distillation, to enable private, accurate and efficient representation learning on resource-constrained devices. Our results show that EDGY runs in tens of milliseconds with 0.2% relative improvement in ‘zero-shot’ ABX score or minimal performance penalties of approximately 5.95% word error rate (WER) in learning linguistic representations from raw voice signals, using a CPU and a single-core ARM processor without specialized hardware.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"90 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice 网络基础设施的帕累托最优防御:理论与实践
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-13 DOI: 10.1145/3567595
Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, M. Backes, Ben Stock, R. Künnemann
The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-web technologies and an infrastructure of interdependent hosts, communication technologies, and trust relations. Incidents like the Chinese Great Cannon or the MyEtherWallet attack make it painfully clear: the security of end users hinges on the security of the surrounding infrastructure: routing, DNS, content delivery, and the PKI. There are many competing, but isolated proposals to increase security, from the network up to the application layer. So far, researchers have focused on analyzing attacks and defenses on specific layers. We still lack an evaluation of how, given the status quo of the web, these proposals can be combined, how effective they are, and at what cost the increase of security comes. In this work, we propose a graph-based analysis based on Stackelberg planning that considers a rich attacker model and a multitude of proposals from IPsec to DNSSEC and SRI. Our threat model considers the security of billions of users against attackers ranging from small hacker groups to nation-state actors. Analyzing the infrastructure of the Top 5k Alexa domains, we discover that the security mechanisms currently deployed are ineffective and that some infrastructure providers have a comparable threat potential to nations. We find a considerable increase of security (up to 13% protected web visits) is possible at a relatively modest cost, due to the effectiveness of mitigations at the application and transport layer, which dominate expensive infrastructure enhancements such as DNSSEC and IPsec.
用户在浏览网页时所接触到的内容的完整性依赖于大量的非网页技术和由相互依赖的主机、通信技术和信任关系组成的基础设施。像中国大炮或MyEtherWallet攻击这样的事件痛苦地表明:最终用户的安全性取决于周围基础设施的安全性:路由,DNS,内容交付和PKI。从网络到应用层,有许多相互竞争但相互孤立的提高安全性的建议。到目前为止,研究人员一直专注于分析特定层的攻击和防御。鉴于网络的现状,我们仍然缺乏对如何将这些建议结合起来的评估,它们的有效性如何,以及安全性的提高需要付出多大的代价。在这项工作中,我们提出了一种基于Stackelberg规划的基于图的分析,该分析考虑了丰富的攻击者模型以及从IPsec到DNSSEC和SRI的众多建议。我们的威胁模型考虑了数十亿用户对从小型黑客组织到民族国家行为者的攻击的安全性。分析前5k Alexa域名的基础设施,我们发现目前部署的安全机制是无效的,一些基础设施提供商对国家具有相当的威胁潜力。我们发现,由于应用程序和传输层的缓解措施的有效性,可以以相对适度的成本大幅提高安全性(受保护的web访问高达13%),这主要是昂贵的基础设施增强,如DNSSEC和IPsec。
{"title":"Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice","authors":"Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, M. Backes, Ben Stock, R. Künnemann","doi":"10.1145/3567595","DOIUrl":"https://doi.org/10.1145/3567595","url":null,"abstract":"The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-web technologies and an infrastructure of interdependent hosts, communication technologies, and trust relations. Incidents like the Chinese Great Cannon or the MyEtherWallet attack make it painfully clear: the security of end users hinges on the security of the surrounding infrastructure: routing, DNS, content delivery, and the PKI. There are many competing, but isolated proposals to increase security, from the network up to the application layer. So far, researchers have focused on analyzing attacks and defenses on specific layers. We still lack an evaluation of how, given the status quo of the web, these proposals can be combined, how effective they are, and at what cost the increase of security comes. In this work, we propose a graph-based analysis based on Stackelberg planning that considers a rich attacker model and a multitude of proposals from IPsec to DNSSEC and SRI. Our threat model considers the security of billions of users against attackers ranging from small hacker groups to nation-state actors. Analyzing the infrastructure of the Top 5k Alexa domains, we discover that the security mechanisms currently deployed are ineffective and that some infrastructure providers have a comparable threat potential to nations. We find a considerable increase of security (up to 13% protected web visits) is possible at a relatively modest cost, due to the effectiveness of mitigations at the application and transport layer, which dominate expensive infrastructure enhancements such as DNSSEC and IPsec.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"26 1","pages":"1 - 36"},"PeriodicalIF":2.3,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47320596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pareto-Optimal Defenses for the Web Infrastructure: Theory and Practice 网络基础设施的帕累托最优防御:理论与实践
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3567595
Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes, Ben Stock, Robert Künnemann

The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-web technologies and an infrastructure of interdependent hosts, communication technologies, and trust relations. Incidents like the Chinese Great Cannon or the MyEtherWallet attack make it painfully clear: the security of end users hinges on the security of the surrounding infrastructure: routing, DNS, content delivery, and the PKI. There are many competing, but isolated proposals to increase security, from the network up to the application layer. So far, researchers have focus on analyzing attacks and defenses on specific layers. We still lack an evaluation of how, given the status quo of the web, these proposals can be combined, how effective they are, and at what cost the increase of security comes. In this work, we propose a graph-based analysis based on Stackelberg planning that considers a rich attacker model and a multitude of proposals from IPsec to DNSSEC and SRI. Our threat model considers the security of billions of users against attackers ranging from small hacker groups to nation-state actors. Analyzing the infrastructure of the Top 5k Alexa domains, we discover that the security mechanisms currently deployed are ineffective and that some infrastructure providers have a comparable threat potential to nations. We find a considerable increase of security (up to 13% protected web visits) is possible at relatively modest cost, due to the effectiveness of mitigations at the application and transport layer, which dominate expensive infrastructure enhancements such as DNSSEC and IPsec.

用户在浏览网页时所接触到的内容的完整性依赖于大量的非网页技术和由相互依赖的主机、通信技术和信任关系组成的基础设施。像中国大炮或MyEtherWallet攻击这样的事件痛苦地表明:最终用户的安全性取决于周围基础设施的安全性:路由,DNS,内容交付和PKI。从网络到应用层,有许多相互竞争但相互孤立的提高安全性的建议。到目前为止,研究人员主要集中在分析特定层的攻击和防御。鉴于网络的现状,我们仍然缺乏对如何将这些建议结合起来的评估,它们的有效性如何,以及安全性的提高需要付出多大的代价。在这项工作中,我们提出了一种基于Stackelberg规划的基于图的分析,该分析考虑了丰富的攻击者模型以及从IPsec到DNSSEC和SRI的众多建议。我们的威胁模型考虑了数十亿用户对从小型黑客组织到民族国家行为者的攻击的安全性。分析前5k Alexa域名的基础设施,我们发现目前部署的安全机制是无效的,一些基础设施提供商对国家具有相当的威胁潜力。我们发现,由于应用程序和传输层的缓解措施的有效性,可以以相对适度的成本大幅提高安全性(受保护的web访问高达13%),这主要是昂贵的基础设施增强,如DNSSEC和IPsec。
{"title":"Pareto-Optimal Defenses for the Web Infrastructure: Theory and Practice","authors":"Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes, Ben Stock, Robert Künnemann","doi":"https://dl.acm.org/doi/10.1145/3567595","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3567595","url":null,"abstract":"<p>The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-web technologies and an infrastructure of interdependent hosts, communication technologies, and trust relations. Incidents like the Chinese Great Cannon or the MyEtherWallet attack make it painfully clear: the security of end users hinges on the security of the surrounding infrastructure: routing, DNS, content delivery, and the PKI. There are many competing, but isolated proposals to increase security, from the network up to the application layer. So far, researchers have focus on analyzing attacks and defenses on specific layers. We still lack an evaluation of how, given the status quo of the web, these proposals can be combined, how effective they are, and at what cost the increase of security comes. In this work, we propose a graph-based analysis based on Stackelberg planning that considers a rich attacker model and a multitude of proposals from IPsec to DNSSEC and SRI. Our threat model considers the security of billions of users against attackers ranging from small hacker groups to nation-state actors. Analyzing the infrastructure of the Top 5k Alexa domains, we discover that the security mechanisms currently deployed are ineffective and that some infrastructure providers have a comparable threat potential to nations. We find a considerable increase of security (up to 13% protected web visits) is possible at relatively modest cost, due to the effectiveness of mitigations at the application and transport layer, which dominate expensive infrastructure enhancements such as DNSSEC and IPsec.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"74 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments 消费者和企业环境中遭遇恶意软件的系统性和系统性风险的比较
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-03 DOI: 10.1145/3565362
Savino Dambra, Leyla Bilge, D. Balzarotti
Malware is still a widespread problem, and it is used by malicious actors to routinely compromise the security of computer systems. Consumers typically rely on a single AV product to detect and block possible malware infections, while corporations often install multiple security products, activate several layers of defenses, and establish security policies among employees. However, if a better security posture should lower the risk of malware infections, then the actual extent to which this happens is still under debate by risk analysis experts. Moreover, the difference in risks encountered by consumers and enterprises has never been empirically studied by using real-world data. In fact, the mere use of third-party software, network services, and the interconnected nature of our society necessarily exposes both classes of users to undiversifiable risks: Independently from how careful users are and how well they manage their cyber hygiene, a portion of that risk would simply exist because of the fact of using a computer, sharing the same networks, and running the same software. In this work, we shed light on both systemic (i.e., diversifiable and dependent on the security posture) and systematic (i.e., undiversifiable and independent of the cyber hygiene) risk classes. Leveraging the telemetry data of a popular security company, we compare, in the first part of our study, the effects that different security measures have on malware encounter risks in consumer and enterprise environments. In the second part, we conduct exploratory research on systematic risk, investigate the quality of nine different indicators we were able to extract from our telemetry, and provide, for the first time, quantitative indicators of their predictive power. Our results show that even if consumers have a slightly lower encounter rate than enterprises (9.8% vs. 12.0%), the latter do considerably better when selecting machines with an increasingly higher uptime (89% vs. 53%). The two segments also diverge when we separately consider the presence of Adware and Potentially Unwanted Applications (PUA) and the generic samples detected through behavioral signatures: While consumers have an encounter rate for Adware and PUA that is 6 times higher than enterprise machines, those on average match behavioral signatures 2 times more frequently than the counterpart. We find, instead, similar trends when analyzing the age of encountered signatures, and the prevalence of different classes of traditional malware (such as Ransomware and Cryptominers). Finally, our findings show that the amount of time a host is active, the volume of files generated on the machine, the number and reputation of vendors of the installed applications, the host geographical location, and its recurrent infected state carry useful information as indicators of systematic risk of malware encounters. Activity days and hours have a higher influence in the risk of consumers, increasing the odds of encountering malw
恶意软件仍然是一个普遍存在的问题,恶意行为者经常利用它来危害计算机系统的安全。消费者通常依靠单一的AV产品来检测和阻止可能的恶意软件感染,而公司通常安装多个安全产品,激活多层防御,并在员工中建立安全策略。然而,如果更好的安全态势应该降低恶意软件感染的风险,那么这种情况发生的实际程度仍在风险分析专家的争论中。此外,消费者和企业遇到的风险差异从未通过使用真实世界的数据进行过实证研究。事实上,仅仅使用第三方软件、网络服务和我们社会的互联性质就必然会使这两类用户面临不可逆转的风险:与用户的谨慎程度和他们对网络卫生的管理程度无关,部分风险的存在只是因为使用计算机、共享相同的网络,并运行相同的软件。在这项工作中,我们揭示了系统性(即多样性和依赖于安全态势)和系统性(如不可逆性和独立于网络卫生)风险类别。在研究的第一部分,我们利用一家流行安全公司的遥测数据,比较了不同安全措施对消费者和企业环境中恶意软件遭遇风险的影响。在第二部分中,我们对系统风险进行了探索性研究,调查了我们能够从遥测中提取的九个不同指标的质量,并首次提供了它们预测能力的定量指标。我们的研究结果表明,即使消费者的遭遇率略低于企业(9.8%对12.0%),后者在选择正常运行时间越来越高的机器时也会做得更好(89%对53%)。当我们分别考虑广告软件和潜在不需要的应用程序(PUA)的存在以及通过行为签名检测到的一般样本时,这两个部分也会出现分歧:虽然消费者对广告软件和PUA的遭遇率是企业机器的6倍,但这些人平均匹配行为签名的频率是同类机器的2倍。相反,我们在分析遇到的签名的年龄和不同类型的传统恶意软件(如勒索软件和加密矿工)的流行率时发现了类似的趋势。最后,我们的研究结果表明,主机处于活动状态的时间、机器上生成的文件量、安装的应用程序的供应商数量和声誉、主机的地理位置及其反复感染的状态都提供了有用的信息,作为恶意软件遭遇系统风险的指标。活动日和时间对消费者的风险影响更大,遇到恶意软件的几率分别增加了4.51和2.65倍。此外,我们衡量主机上生成的文件量是否代表了一个可靠的指标,尤其是在考虑Adware时。我们进一步报告说,对于那些过去已经报告过这种签名的机器来说,遇到蠕虫和广告软件的可能性要高得多(在消费者和企业中平均为8次)。
{"title":"A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments","authors":"Savino Dambra, Leyla Bilge, D. Balzarotti","doi":"10.1145/3565362","DOIUrl":"https://doi.org/10.1145/3565362","url":null,"abstract":"Malware is still a widespread problem, and it is used by malicious actors to routinely compromise the security of computer systems. Consumers typically rely on a single AV product to detect and block possible malware infections, while corporations often install multiple security products, activate several layers of defenses, and establish security policies among employees. However, if a better security posture should lower the risk of malware infections, then the actual extent to which this happens is still under debate by risk analysis experts. Moreover, the difference in risks encountered by consumers and enterprises has never been empirically studied by using real-world data. In fact, the mere use of third-party software, network services, and the interconnected nature of our society necessarily exposes both classes of users to undiversifiable risks: Independently from how careful users are and how well they manage their cyber hygiene, a portion of that risk would simply exist because of the fact of using a computer, sharing the same networks, and running the same software. In this work, we shed light on both systemic (i.e., diversifiable and dependent on the security posture) and systematic (i.e., undiversifiable and independent of the cyber hygiene) risk classes. Leveraging the telemetry data of a popular security company, we compare, in the first part of our study, the effects that different security measures have on malware encounter risks in consumer and enterprise environments. In the second part, we conduct exploratory research on systematic risk, investigate the quality of nine different indicators we were able to extract from our telemetry, and provide, for the first time, quantitative indicators of their predictive power. Our results show that even if consumers have a slightly lower encounter rate than enterprises (9.8% vs. 12.0%), the latter do considerably better when selecting machines with an increasingly higher uptime (89% vs. 53%). The two segments also diverge when we separately consider the presence of Adware and Potentially Unwanted Applications (PUA) and the generic samples detected through behavioral signatures: While consumers have an encounter rate for Adware and PUA that is 6 times higher than enterprise machines, those on average match behavioral signatures 2 times more frequently than the counterpart. We find, instead, similar trends when analyzing the age of encountered signatures, and the prevalence of different classes of traditional malware (such as Ransomware and Cryptominers). Finally, our findings show that the amount of time a host is active, the volume of files generated on the machine, the number and reputation of vendors of the installed applications, the host geographical location, and its recurrent infected state carry useful information as indicators of systematic risk of malware encounters. Activity days and hours have a higher influence in the risk of consumers, increasing the odds of encountering malw","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":" ","pages":"1 - 30"},"PeriodicalIF":2.3,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46675772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments 消费者和企业环境中遭遇恶意软件的系统性和系统性风险的比较
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-03 DOI: https://dl.acm.org/doi/10.1145/3565362
Savino Dambra, Leyla Bilge, Davide Balzarotti
<p>Malware is still a widespread problem and it is used by malicious actors to routinely compromise the security of computer systems. Consumers typically rely on a single AV product to detect and block possible malware infections, while corporations often install multiple security products, activate several layers of defenses, and establish security policies among employees. However, if a better security posture should lower the risk of malware infections, the actual extent to which this happens is still under debate by risk analysis experts. Moreover, the difference in risks encountered by consumers and enterprises has never been empirically studied by using real-world data. </p><p>In fact, the mere use of third-party software, network services, and the interconnected nature of our society necessarily exposes both classes of users to undiversifiable risks: independently from how careful users are and how well they manage their cyber hygiene, a portion of that risk would simply exist because of the fact of using a computer, sharing the same networks, and running the same software. </p><p>In this work, we shed light on both systemic (i.e., diversifiable and dependent on the security posture) and systematic (i.e., undiversifiable and independent of the cyber hygiene) risk classes. Leveraging the telemetry data of a popular security company, we compare, in the first part of our study, the effects that different security measures have on malware encounter risks in consumer and enterprise environments. In the second part, we conduct exploratory research on systematic risk, investigate the quality of nine different indicators we were able to extract from our telemetry, and provide, for the first time, quantitative indicators of their predictive power. </p><p>Our results show that even if consumers have a slightly lower encounter rate than enterprises (9.8% vs 12.0%), the latter do considerably better when selecting machines with an increasingly higher uptime (89% vs 53%). The two segments also diverge when we separately consider the presence of Adware and Potentially Unwanted Applications (PUA), and the generic samples detected through behavioral signatures: while consumers have an encounter rate for Adware and PUA that is 6 times higher than enterprise machines, those on average match behavioral signatures two times more frequently than the counterpart. We find, instead, similar trends when analyzing the age of encountered signatures, and the prevalence of different classes of traditional malware (such as Ransomware and Cryptominers). Finally, our findings show that the amount of time a host is active, the volume of files generated on the machine, the number and reputation of vendors of the installed applications, the host geographical location and its recurrent infected state carry useful information as indicators of systematic risk of malware encounters. Activity days and hours have a higher influence in the risk of consumers, increasing the odds of
恶意软件仍然是一个普遍存在的问题,恶意行为者经常使用它来破坏计算机系统的安全。消费者通常依靠单一的反病毒产品来检测和阻止可能的恶意软件感染,而企业通常安装多个安全产品,激活多层防御,并在员工之间建立安全策略。然而,如果一个更好的安全状态可以降低恶意软件感染的风险,那么这种情况发生的实际程度仍在风险分析专家的争论中。此外,消费者和企业所面临的风险差异从未被使用真实世界的数据进行实证研究。事实上,仅仅是使用第三方软件、网络服务,以及我们社会相互联系的本质,就必然会使这两类用户面临不可分散的风险:与用户的谨慎程度和他们管理网络卫生的程度无关,其中一部分风险仅仅是因为使用计算机、共享相同的网络和运行相同的软件而存在。在这项工作中,我们阐明了系统性(即,多样化和依赖于安全态势)和系统性(即,不可多样化和独立于网络卫生)风险类别。利用一家知名安全公司的遥测数据,我们在研究的第一部分比较了不同安全措施在消费者和企业环境中对恶意软件遇到风险的影响。在第二部分中,我们对系统性风险进行了探索性研究,调查了我们从遥测中提取的9个不同指标的质量,并首次提供了它们预测能力的定量指标。我们的结果表明,即使消费者的遇到率略低于企业(9.8%对12.0%),后者在选择正常运行时间越来越长的机器时做得更好(89%对53%)。当我们分别考虑广告软件和潜在不受欢迎的应用程序(PUA)的存在,以及通过行为特征检测到的通用样本时,这两个部分也出现了分歧:虽然消费者对广告软件和PUA的遭遇率是企业机器的6倍,但平均匹配行为特征的频率是对等机器的两倍。相反,在分析遇到的签名的年龄以及不同类别的传统恶意软件(如勒索软件和加密矿工)的流行程度时,我们发现了类似的趋势。最后,我们的研究结果表明,主机的活动时间、机器上生成的文件量、已安装应用程序供应商的数量和声誉、主机的地理位置及其反复感染状态,都可以作为恶意软件遭遇系统风险的有用信息指标。活动天数和活动时间对消费者的风险影响较大,遭遇恶意软件的几率分别增加4.51倍和2.65倍。此外,我们测量主机上生成的文件量是一个可靠的指标,特别是在考虑Adware时。我们进一步报告说,对于那些过去已经报告过这种签名的机器,遇到蠕虫和广告软件的可能性要高得多(在消费者和企业中平均为8次)。
{"title":"A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments","authors":"Savino Dambra, Leyla Bilge, Davide Balzarotti","doi":"https://dl.acm.org/doi/10.1145/3565362","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3565362","url":null,"abstract":"&lt;p&gt;Malware is still a widespread problem and it is used by malicious actors to routinely compromise the security of computer systems. Consumers typically rely on a single AV product to detect and block possible malware infections, while corporations often install multiple security products, activate several layers of defenses, and establish security policies among employees. However, if a better security posture should lower the risk of malware infections, the actual extent to which this happens is still under debate by risk analysis experts. Moreover, the difference in risks encountered by consumers and enterprises has never been empirically studied by using real-world data. &lt;/p&gt;&lt;p&gt;In fact, the mere use of third-party software, network services, and the interconnected nature of our society necessarily exposes both classes of users to undiversifiable risks: independently from how careful users are and how well they manage their cyber hygiene, a portion of that risk would simply exist because of the fact of using a computer, sharing the same networks, and running the same software. &lt;/p&gt;&lt;p&gt;In this work, we shed light on both systemic (i.e., diversifiable and dependent on the security posture) and systematic (i.e., undiversifiable and independent of the cyber hygiene) risk classes. Leveraging the telemetry data of a popular security company, we compare, in the first part of our study, the effects that different security measures have on malware encounter risks in consumer and enterprise environments. In the second part, we conduct exploratory research on systematic risk, investigate the quality of nine different indicators we were able to extract from our telemetry, and provide, for the first time, quantitative indicators of their predictive power. &lt;/p&gt;&lt;p&gt;Our results show that even if consumers have a slightly lower encounter rate than enterprises (9.8% vs 12.0%), the latter do considerably better when selecting machines with an increasingly higher uptime (89% vs 53%). The two segments also diverge when we separately consider the presence of Adware and Potentially Unwanted Applications (PUA), and the generic samples detected through behavioral signatures: while consumers have an encounter rate for Adware and PUA that is 6 times higher than enterprise machines, those on average match behavioral signatures two times more frequently than the counterpart. We find, instead, similar trends when analyzing the age of encountered signatures, and the prevalence of different classes of traditional malware (such as Ransomware and Cryptominers). Finally, our findings show that the amount of time a host is active, the volume of files generated on the machine, the number and reputation of vendors of the installed applications, the host geographical location and its recurrent infected state carry useful information as indicators of systematic risk of malware encounters. Activity days and hours have a higher influence in the risk of consumers, increasing the odds of","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"13 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1