首页 > 最新文献

2005 IEEE Symposium on Security and Privacy (S&P'05)最新文献

英文 中文
Seeing-is-believing: using camera phones for human-verifiable authentication 眼见为实:使用照相手机进行人类可验证的身份验证
Pub Date : 2005-05-08 DOI: 10.1504/IJSN.2009.023425
Jonathan M. McCune, A. Perrig, M. Reiter
Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze seeing-is-believing, a system that utilizes 2D barcodes and camera-telephones to implement a visual channel for authentication and demonstrative identification of devices. We apply this visual channel to several problems in computer security, including authenticated key exchange between devices that share no prior context, establishment of a trusted path for configuration of a TCG-compliant computing platform, and secure device configuration in the context of a smart home.
如果没有受信任的权威机构的帮助,现有的验证设备之间通信的机制对普通用户来说是不方便的。我们提出并分析了眼见为实,这是一个利用二维条形码和摄像电话来实现设备认证和示范识别的视觉通道的系统。我们将这种可视化通道应用于计算机安全中的几个问题,包括在没有共享先前上下文的设备之间进行身份验证密钥交换,为符合tcg的计算平台配置建立可信路径,以及在智能家居环境中安全配置设备。
{"title":"Seeing-is-believing: using camera phones for human-verifiable authentication","authors":"Jonathan M. McCune, A. Perrig, M. Reiter","doi":"10.1504/IJSN.2009.023425","DOIUrl":"https://doi.org/10.1504/IJSN.2009.023425","url":null,"abstract":"Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze seeing-is-believing, a system that utilizes 2D barcodes and camera-telephones to implement a visual channel for authentication and demonstrative identification of devices. We apply this visual channel to several problems in computer security, including authenticated key exchange between devices that share no prior context, establishment of a trusted path for configuration of a TCG-compliant computing platform, and secure device configuration in the context of a smart home.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"20 1","pages":"110-124"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73416770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 559
Worm origin identification using random moonwalks 利用随机月球漫步识别蠕虫起源
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.23
Yinglian Xie, V. Sekar, D. Maltz, M. Reiter, Hui Zhang
We propose a novel technique that can determine both the host responsible for originating a propagating worm attack and the set of attack flows that make up the initial stages of the attack tree via which the worm infected successive generations of victims. We argue that knowledge of both is important for combating worms: knowledge of the origin supports law enforcement, and knowledge of the causal flows that advance the attack supports diagnosis of how network defenses were breached. Our technique exploits the "wide tree" shape of a worm propagation emanating from the source by performing random "moonwalks" backward in time along paths of flows. Correlating the repeated walks reveals the initial causal flows, thereby aiding in identifying the source. Using analysis, simulation, and experiments with real world traces, we show how the technique works against both today's fast propagating worms and stealthy worms that attempt to hide their attack flows among background traffic.
我们提出了一种新的技术,可以确定负责发起传播蠕虫攻击的主机和构成攻击树初始阶段的攻击流集,蠕虫通过这些攻击流感染了连续几代受害者。我们认为,了解这两者对于对抗蠕虫很重要:了解起源有助于执法,了解推动攻击的因果关系有助于诊断网络防御是如何被破坏的。我们的技术利用了蠕虫从源头传播的“宽树”形状,沿着流的路径进行随机的“月球漫步”。将重复的行走联系起来,揭示了最初的因果流,从而有助于确定来源。通过对真实世界的分析、模拟和实验,我们展示了该技术如何对抗当今快速传播的蠕虫和试图将其攻击流隐藏在后台流量中的隐形蠕虫。
{"title":"Worm origin identification using random moonwalks","authors":"Yinglian Xie, V. Sekar, D. Maltz, M. Reiter, Hui Zhang","doi":"10.1109/SP.2005.23","DOIUrl":"https://doi.org/10.1109/SP.2005.23","url":null,"abstract":"We propose a novel technique that can determine both the host responsible for originating a propagating worm attack and the set of attack flows that make up the initial stages of the attack tree via which the worm infected successive generations of victims. We argue that knowledge of both is important for combating worms: knowledge of the origin supports law enforcement, and knowledge of the causal flows that advance the attack supports diagnosis of how network defenses were breached. Our technique exploits the \"wide tree\" shape of a worm propagation emanating from the source by performing random \"moonwalks\" backward in time along paths of flows. Correlating the repeated walks reveals the initial causal flows, thereby aiding in identifying the source. Using analysis, simulation, and experiments with real world traces, we show how the technique works against both today's fast propagating worms and stealthy worms that attempt to hide their attack flows among background traffic.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"28 1","pages":"242-256"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84420146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
BIND: a fine-grained attestation service for secure distributed systems BIND:用于安全分布式系统的细粒度认证服务
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.4
E. Shi, A. Perrig, L. V. Doorn
In this paper we propose BIND (binding instructions and data), a fine-grained attestation service for securing distributed systems. Code attestation has recently received considerable attention in trusted computing. However, current code attestation technology is relatively immature. First, due to the great variability in software versions and configurations, verification of the hash is difficult. Second, the time-of-use and time-of-attestation discrepancy remains to be addressed, since the code may be correct at the time of the attestation, but it may be compromised by the time of use. The goal of BIND is to address these issues and make code attestation more usable in securing distributed systems. BIND offers the following properties: (1) BIND performs fine-grained attestation. Instead of attesting to the entire memory content, BIND attests only to the piece of code we are concerned about. This greatly simplifies verification. (2) BIND narrows the gap between time-of-attestation and time-of-use. BIND measures a piece of code immediately before it is executed and uses a sandboxing mechanism to protect the execution of the attested code. (3) BIND ties the code attestation with the data that the code produces, such that we can pinpoint what code has been run to generate that data. In addition, by incorporating the verification of input data integrity into the attestation, BIND offers transitive integrity verification, i.e., through one signature, we can vouch for the entire chain of processes that have performed transformations over a piece of data. BIND offers a general solution toward establishing a trusted environment for distributed system designers.
在本文中,我们提出BIND(绑定指令和数据),这是一种用于保护分布式系统的细粒度认证服务。代码认证最近在可信计算领域受到了相当大的关注。但是,目前的代码认证技术还比较不成熟。首先,由于软件版本和配置的巨大可变性,验证哈希很困难。其次,使用时间和认证时间的差异仍有待解决,因为代码在认证时可能是正确的,但它可能因使用时间而受到损害。BIND的目标是解决这些问题,并使代码认证在保护分布式系统方面更有用。BIND提供以下属性:(1)BIND执行细粒度认证。BIND不验证整个内存内容,而只验证我们关心的代码片段。这大大简化了验证。(2) BIND缩小了认证时间和使用时间之间的差距。BIND在一段代码执行之前立即对其进行度量,并使用沙盒机制来保护已验证代码的执行。(3) BIND将代码认证与代码生成的数据绑定在一起,这样我们就可以确定运行了哪些代码来生成该数据。此外,通过将对输入数据完整性的验证合并到认证中,BIND提供了可传递的完整性验证,也就是说,通过一个签名,我们可以为对一段数据执行转换的整个流程链进行担保。BIND为分布式系统设计人员提供了建立可信环境的通用解决方案。
{"title":"BIND: a fine-grained attestation service for secure distributed systems","authors":"E. Shi, A. Perrig, L. V. Doorn","doi":"10.1109/SP.2005.4","DOIUrl":"https://doi.org/10.1109/SP.2005.4","url":null,"abstract":"In this paper we propose BIND (binding instructions and data), a fine-grained attestation service for securing distributed systems. Code attestation has recently received considerable attention in trusted computing. However, current code attestation technology is relatively immature. First, due to the great variability in software versions and configurations, verification of the hash is difficult. Second, the time-of-use and time-of-attestation discrepancy remains to be addressed, since the code may be correct at the time of the attestation, but it may be compromised by the time of use. The goal of BIND is to address these issues and make code attestation more usable in securing distributed systems. BIND offers the following properties: (1) BIND performs fine-grained attestation. Instead of attesting to the entire memory content, BIND attests only to the piece of code we are concerned about. This greatly simplifies verification. (2) BIND narrows the gap between time-of-attestation and time-of-use. BIND measures a piece of code immediately before it is executed and uses a sandboxing mechanism to protect the execution of the attested code. (3) BIND ties the code attestation with the data that the code produces, such that we can pinpoint what code has been run to generate that data. In addition, by incorporating the verification of input data integrity into the attestation, BIND offers transitive integrity verification, i.e., through one signature, we can vouch for the entire chain of processes that have performed transformations over a piece of data. BIND offers a general solution toward establishing a trusted environment for distributed system designers.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"39 1","pages":"154-168"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76145772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 278
Efficient intrusion detection using automaton inlining 使用自动内联的高效入侵检测
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.1
R. Gopalakrishna, E. Spafford, J. Vitek
Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is detected is appealing, existing systems exhibit serious shortcomings in terms of accuracy and/or efficiency. To gain acceptance, a number of technical advances are needed. In this paper we focus on automated, conservative, intrusion detection techniques, i.e. techniques which do not require human intervention and do not suffer from false positives. We present a static analysis algorithm for constructing a flow- and context-sensitive model of a program that allows for efficient online validation. Context-sensitivity is essential to reduce the number of impossible control-flow paths accepted by the intrusion detection system because such paths provide opportunities for attackers to evade detection. An important consideration for on-the-fly intrusion detection is to reduce the performance overhead caused by monitoring. Compared to the existing approaches, our inlined automaton model (IAM) presents a good tradeoff between accuracy and performance. On a 32K line program, the monitoring overhead is negligible. While the space requirements of a naive IAM implementation can be quite high, compaction techniques can be employed to substantially reduce that footprint.
基于主机的入侵检测系统试图通过发现偏离预期模式的程序行为来识别攻击。虽然即时执行行为验证并在检测到违规时立即终止错误任务的想法很有吸引力,但现有系统在准确性和/或效率方面表现出严重的缺陷。为了获得认可,需要在技术上取得一些进步。在本文中,我们专注于自动化,保守,入侵检测技术,即不需要人为干预和不遭受假阳性的技术。我们提出了一种静态分析算法,用于构建流程和上下文敏感的程序模型,该模型允许有效的在线验证。上下文敏感性对于减少入侵检测系统接受的不可能控制流路径的数量至关重要,因为这些路径为攻击者提供了逃避检测的机会。动态入侵检测的一个重要考虑因素是减少由监视引起的性能开销。与现有方法相比,我们的内联自动机模型(IAM)在精度和性能之间取得了很好的平衡。在32K行程序中,监视开销可以忽略不计。虽然初始IAM实现的空间需求可能相当高,但可以使用压缩技术来大幅减少空间占用。
{"title":"Efficient intrusion detection using automaton inlining","authors":"R. Gopalakrishna, E. Spafford, J. Vitek","doi":"10.1109/SP.2005.1","DOIUrl":"https://doi.org/10.1109/SP.2005.1","url":null,"abstract":"Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is detected is appealing, existing systems exhibit serious shortcomings in terms of accuracy and/or efficiency. To gain acceptance, a number of technical advances are needed. In this paper we focus on automated, conservative, intrusion detection techniques, i.e. techniques which do not require human intervention and do not suffer from false positives. We present a static analysis algorithm for constructing a flow- and context-sensitive model of a program that allows for efficient online validation. Context-sensitivity is essential to reduce the number of impossible control-flow paths accepted by the intrusion detection system because such paths provide opportunities for attackers to evade detection. An important consideration for on-the-fly intrusion detection is to reduce the performance overhead caused by monitoring. Compared to the existing approaches, our inlined automaton model (IAM) presents a good tradeoff between accuracy and performance. On a 32K line program, the monitoring overhead is negligible. While the space requirements of a naive IAM implementation can be quite high, compaction techniques can be employed to substantially reduce that footprint.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"97 1","pages":"18-31"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81363945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Towards constant bandwidth overhead integrity checking of untrusted data 对不可信数据进行恒定带宽开销的完整性检查
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.24
Dwaine E. Clarke
We present an adaptive tree-log scheme to improve the performance of checking the integrity of arbitrarily large untrusted data, when using only a small fixed-sized trusted state. Currently, hash trees are used to check the data. In many systems that use hash trees, programs perform many data operations before performing a critical operation that exports a result outside of the program's execution environment. The adaptive tree-log scheme we present uses this observation to harness the power of the constant runtime bandwidth overhead of a log-based scheme. For all programs, the adaptive tree-log scheme's bandwidth overhead is guaranteed to never be worse than a parameterizable worst case bound. Furthermore, for all programs, as the average number of times the program accesses data between critical operations increases, the adaptive tree-log scheme's bandwidth overhead moves from a logarithmic to a constant bandwidth overhead.
我们提出了一种自适应树日志方案,以提高在仅使用固定大小的小可信状态时检查任意大的不可信数据完整性的性能。目前使用哈希树来检查数据。在许多使用哈希树的系统中,程序在执行将结果导出到程序执行环境之外的关键操作之前执行许多数据操作。我们提出的自适应树日志方案利用这一观察结果来利用基于日志的方案的恒定运行时带宽开销的力量。对于所有程序,自适应树日志方案的带宽开销保证永远不会低于可参数化的最坏情况。此外,对于所有程序,随着程序在关键操作之间访问数据的平均次数增加,自适应树日志方案的带宽开销从对数带宽开销变为常数带宽开销。
{"title":"Towards constant bandwidth overhead integrity checking of untrusted data","authors":"Dwaine E. Clarke","doi":"10.1109/SP.2005.24","DOIUrl":"https://doi.org/10.1109/SP.2005.24","url":null,"abstract":"We present an adaptive tree-log scheme to improve the performance of checking the integrity of arbitrarily large untrusted data, when using only a small fixed-sized trusted state. Currently, hash trees are used to check the data. In many systems that use hash trees, programs perform many data operations before performing a critical operation that exports a result outside of the program's execution environment. The adaptive tree-log scheme we present uses this observation to harness the power of the constant runtime bandwidth overhead of a log-based scheme. For all programs, the adaptive tree-log scheme's bandwidth overhead is guaranteed to never be worse than a parameterizable worst case bound. Furthermore, for all programs, as the average number of times the program accesses data between critical operations increases, the adaptive tree-log scheme's bandwidth overhead moves from a logarithmic to a constant bandwidth overhead.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"21 1","pages":"139-153"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90667799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
On safety in discretionary access control 论自由访问控制中的安全性
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.14
Ninghui Li, Mahesh V. Tripunitara
An apparently prevailing myth is that safety is undecidable in discretionary access control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decidable. In this paper we dispel this myth. We argue that DAC should not be equated with the Harrison-Ruzzo-Ullman (1976) access matrix scheme, in which safety is undecidable. We present an efficient (running time cubic in its input size) algorithm for deciding safety in the Graham-Denning (1972) DAC scheme, which subsumes the DAC schemes used in the literature on comparing DAC with other access control models. We also counter several claims made in recent work by Solworth and Sloan (2004), in which the authors present a new access control scheme based on labels and relabelling and assert that it can implement the full range of DAC models. We present a precise characterization of their access control scheme and show that it does not adequately capture a relatively simple DAC scheme.
一个普遍存在的误解是,在自由访问控制(DAC)中,安全性是不可确定的;因此,需要发明新的DAC方案,其中安全性分析是可确定的。在本文中,我们打破了这个神话。我们认为DAC不应该等同于Harrison-Ruzzo-Ullman(1976)访问矩阵方案,其中安全性是不可确定的。在Graham-Denning (1972) DAC方案中,我们提出了一种有效的(输入大小的运行时间立方)算法来决定安全性,该算法包含了文献中用于比较DAC与其他访问控制模型的DAC方案。我们还反驳了Solworth和Sloan(2004)在最近的工作中提出的几个主张,其中作者提出了一种基于标签和重新标签的新访问控制方案,并断言它可以实现DAC模型的全部范围。我们提出了他们的访问控制方案的精确表征,并表明它不能充分捕获相对简单的DAC方案。
{"title":"On safety in discretionary access control","authors":"Ninghui Li, Mahesh V. Tripunitara","doi":"10.1109/SP.2005.14","DOIUrl":"https://doi.org/10.1109/SP.2005.14","url":null,"abstract":"An apparently prevailing myth is that safety is undecidable in discretionary access control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decidable. In this paper we dispel this myth. We argue that DAC should not be equated with the Harrison-Ruzzo-Ullman (1976) access matrix scheme, in which safety is undecidable. We present an efficient (running time cubic in its input size) algorithm for deciding safety in the Graham-Denning (1972) DAC scheme, which subsumes the DAC schemes used in the literature on comparing DAC with other access control models. We also counter several claims made in recent work by Solworth and Sloan (2004), in which the authors present a new access control scheme based on labels and relabelling and assert that it can implement the full range of DAC models. We present a precise characterization of their access control scheme and show that it does not adequately capture a relatively simple DAC scheme.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"1 1","pages":"96-109"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76209831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Language-based generation and evaluation of NIDS signatures 基于语言的入侵入侵特征生成与评估
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.10
Shai Rubin, S. Jha, B. Miller
We present a methodology to automatically construct robust signatures whose accuracy is based on formal reasoning so it can be systematically evaluated. Our methodology is based on two formal languages that describe different properties of a given attack. The first language, called a session signature, describes temporal relations between the attack events. The second, called an attack invariant, describes semantic properties that hold in any instance of the attack. For example, an invariant may state that a given FTP attack must include a successful FTP login and can be launched only after the FTP representation mode has been set to ASCII. We iteratively eliminate false positives and negatives from an initial session signature by comparing the signature language to the language of the invariant. We developed GARD, a tool for session-signature construction, and used it to construct session signatures for multi-step attacks. We show that a session signature is more accurate than existing signatures.
我们提出了一种自动构建鲁棒签名的方法,其准确性基于形式推理,因此可以系统地评估。我们的方法基于描述给定攻击的不同属性的两种形式语言。第一种语言称为会话签名,描述攻击事件之间的时间关系。第二种称为攻击不变量,描述在任何攻击实例中都保持的语义属性。例如,一个不变量可能声明一个给定的FTP攻击必须包含一个成功的FTP登录,并且只有在FTP表示模式被设置为ASCII之后才能启动。我们通过比较签名语言和不变量语言来迭代地消除初始会话签名中的假阳性和假阴性。我们开发了会话签名构建工具GARD,并使用它来构建针对多步攻击的会话签名。我们证明了会话签名比现有签名更准确。
{"title":"Language-based generation and evaluation of NIDS signatures","authors":"Shai Rubin, S. Jha, B. Miller","doi":"10.1109/SP.2005.10","DOIUrl":"https://doi.org/10.1109/SP.2005.10","url":null,"abstract":"We present a methodology to automatically construct robust signatures whose accuracy is based on formal reasoning so it can be systematically evaluated. Our methodology is based on two formal languages that describe different properties of a given attack. The first language, called a session signature, describes temporal relations between the attack events. The second, called an attack invariant, describes semantic properties that hold in any instance of the attack. For example, an invariant may state that a given FTP attack must include a successful FTP login and can be launched only after the FTP representation mode has been set to ASCII. We iteratively eliminate false positives and negatives from an initial session signature by comparing the signature language to the language of the invariant. We developed GARD, a tool for session-signature construction, and used it to construct session signatures for multi-step attacks. We show that a session signature is more accurate than existing signatures.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"86 1","pages":"3-17"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77995127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Detection of denial-of-message attacks on sensor network broadcasts 传感器网络广播中拒绝报文攻击的检测
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.7
Jonathan M. McCune, E. Shi, A. Perrig, M. Reiter
So far sensor network broadcast protocols assume a trustworthy environment. However in safety and mission-critical sensor networks this assumption may not be valid and some sensor nodes might be adversarial. In these environments, malicious sensor nodes can deprive other nodes from receiving a broadcast message. We call this attack a denial-of-message attack (DoM). In this paper we model and analyze this attack, and present countermeasures. We present SIS, a secure implicit sampling scheme that permits a broadcasting base station to probabilistically detect the failure of nodes to receive its broadcast, even if these failures result from an attacker motivated to induce these failures undetectably. SIS works by eliciting authenticated acknowledgments from a subset of nodes per broadcast, where the subset is unpredictable to the attacker and tunable so as to mitigate acknowledgment implosion on the base station. We use a game-theoretic approach to evaluate this scheme in the face of an optimal attacker that attempts to maximize the number of nodes it denies the broadcast while remaining undetected by the base station, and show that SIS significantly constrains such an attacker even in sensor networks exhibiting high intrinsic loss rates. We also discuss extensions that permit more targeted detection capabilities.
到目前为止,传感器网络广播协议假设了一个可信的环境。然而,在安全和关键任务传感器网络中,这种假设可能不成立,一些传感器节点可能是对抗性的。在这些环境中,恶意传感器节点可以阻止其他节点接收广播消息。我们称这种攻击为拒绝消息攻击(DoM)。本文对这种攻击进行了建模和分析,并提出了相应的对策。我们提出SIS,一种安全的隐式采样方案,允许广播基站概率检测节点接收其广播的故障,即使这些故障是由攻击者动机引起的,无法检测到这些故障。SIS的工作原理是从每次广播的节点子集中引出经过身份验证的确认,其中子集对攻击者来说是不可预测的,并且可以进行调整,以减轻基站上的确认内爆。面对最优攻击者,我们使用博弈论方法来评估该方案,该攻击者试图最大化其拒绝广播的节点数量,同时不被基站检测到,并表明即使在具有高内在损失率的传感器网络中,SIS也显着限制了这样的攻击者。我们还讨论了允许更有针对性的检测功能的扩展。
{"title":"Detection of denial-of-message attacks on sensor network broadcasts","authors":"Jonathan M. McCune, E. Shi, A. Perrig, M. Reiter","doi":"10.1109/SP.2005.7","DOIUrl":"https://doi.org/10.1109/SP.2005.7","url":null,"abstract":"So far sensor network broadcast protocols assume a trustworthy environment. However in safety and mission-critical sensor networks this assumption may not be valid and some sensor nodes might be adversarial. In these environments, malicious sensor nodes can deprive other nodes from receiving a broadcast message. We call this attack a denial-of-message attack (DoM). In this paper we model and analyze this attack, and present countermeasures. We present SIS, a secure implicit sampling scheme that permits a broadcasting base station to probabilistically detect the failure of nodes to receive its broadcast, even if these failures result from an attacker motivated to induce these failures undetectably. SIS works by eliciting authenticated acknowledgments from a subset of nodes per broadcast, where the subset is unpredictable to the attacker and tunable so as to mitigate acknowledgment implosion on the base station. We use a game-theoretic approach to evaluate this scheme in the face of an optimal attacker that attempts to maximize the number of nodes it denies the broadcast while remaining undetected by the base station, and show that SIS significantly constrains such an attacker even in sensor networks exhibiting high intrinsic loss rates. We also discuss extensions that permit more targeted detection capabilities.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"69 1","pages":"64-78"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83234979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 163
Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts 跨越式数据包链接和不同的密钥分布,以提高网络广播的完整性
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.11
M. Goodrich
We present two new approaches to improving the integrity of network broadcasts and multicasts with low storage and computation overhead. The first approach is a leapfrog linking protocol for securing the integrity of packets as they traverse a network during a broadcast, such as in the setup phase for link-state routing. This technique allows each router to gain confidence about the integrity of a packet before passing it on to the next router; hence, allows many integrity violations to be stopped immediately in their tracks. The second approach is a novel key predistribution scheme that we use in conjunction with a small number of hashed message authentication codes (HMAC), which allows end-to-end integrity checking as well as improved hop-by-hop integrity checking. Our schemes are suited to environments, such as in ad hoc and overlay networks, where routers can share only a small number of symmetric keys. Moreover, our protocols do not use encryption (which, of course, can be added as an optional security enhancement). Instead, security is based strictly on the use of one-way hash functions; hence, our algorithms are considerably faster than those based on traditional public-key signature schemes. This improvement in speed comes with only modest reductions in the security for broadcasting, as our schemes can tolerate small numbers of malicious routers, provided they do not form significant cooperating coalitions.
我们提出了两种新的方法来提高网络广播和组播的完整性,同时降低存储和计算开销。第一种方法是跳跃式链接协议,用于在广播期间(例如在链路状态路由的设置阶段)遍历网络时保护数据包的完整性。该技术允许每个路由器在将数据包传递给下一个路由器之前获得对数据包完整性的信心;因此,允许许多完整性违规立即停止在他们的轨道。第二种方法是一种新的密钥预分发方案,我们将其与少量哈希消息身份验证码(HMAC)结合使用,它允许端到端完整性检查以及改进的逐跳完整性检查。我们的方案适合于环境,例如在ad hoc和覆盖网络中,路由器只能共享少量对称密钥。此外,我们的协议不使用加密(当然,可以作为可选的安全增强添加加密)。相反,安全性严格基于单向散列函数的使用;因此,我们的算法比基于传统公钥签名方案的算法要快得多。速度的提高只带来了广播安全性的适度降低,因为我们的方案可以容忍少量恶意路由器,只要它们不形成重要的合作联盟。
{"title":"Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts","authors":"M. Goodrich","doi":"10.1109/SP.2005.11","DOIUrl":"https://doi.org/10.1109/SP.2005.11","url":null,"abstract":"We present two new approaches to improving the integrity of network broadcasts and multicasts with low storage and computation overhead. The first approach is a leapfrog linking protocol for securing the integrity of packets as they traverse a network during a broadcast, such as in the setup phase for link-state routing. This technique allows each router to gain confidence about the integrity of a packet before passing it on to the next router; hence, allows many integrity violations to be stopped immediately in their tracks. The second approach is a novel key predistribution scheme that we use in conjunction with a small number of hashed message authentication codes (HMAC), which allows end-to-end integrity checking as well as improved hop-by-hop integrity checking. Our schemes are suited to environments, such as in ad hoc and overlay networks, where routers can share only a small number of symmetric keys. Moreover, our protocols do not use encryption (which, of course, can be added as an optional security enhancement). Instead, security is based strictly on the use of one-way hash functions; hence, our algorithms are considerably faster than those based on traditional public-key signature schemes. This improvement in speed comes with only modest reductions in the security for broadcasting, as our schemes can tolerate small numbers of malicious routers, provided they do not form significant cooperating coalitions.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"118 1","pages":"196-207"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89121522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Low-cost traffic analysis of Tor Tor的低成本流量分析
Pub Date : 2005-05-08 DOI: 10.1109/SP.2005.12
S. Murdoch, G. Danezis
Tor is the second generation onion router supporting the anonymous transport of TCP streams over the Internet. Its low latency makes it very suitable for common tasks, such as Web browsing, but insecure against traffic-analysis attacks by a global passive adversary. We present new traffic-analysis techniques that allow adversaries with only a partial view of the network to infer which nodes are being used to relay the anonymous streams and therefore greatly reduce the anonymity provided by Tor. Furthermore, we show that otherwise unrelated streams can be linked back to the same initiator Our attack is feasible for the adversary anticipated by the Tor designers. Our theoretical attacks are backed up by experiments performed on the deployed, albeit experimental, Tor network. Our techniques should also be applicable to any low latency anonymous network. These attacks highlight the relationship between the field of traffic-analysis and more traditional computer security issues, such as covert channel analysis. Our research also highlights that the inability to directly observe network links does not prevent an attacker from performing traffic-analysis: the adversary can use the anonymising network as an oracle to infer the traffic load on remote nodes in order to perform traffic-analysis.
Tor是第二代洋葱路由器,支持在互联网上匿名传输TCP流。它的低延迟使得它非常适合于常见的任务,例如Web浏览,但是对于来自全局被动对手的流量分析攻击是不安全的。我们提出了新的流量分析技术,允许对手只有部分的网络视图来推断哪些节点被用来中继匿名流,因此大大降低了Tor提供的匿名性。此外,我们表明,其他不相关的流可以链接回同一个发起者。我们的攻击对于Tor设计者预期的对手是可行的。我们的理论攻击得到了在部署的Tor网络上进行的实验的支持,尽管是实验性的。我们的技术也应该适用于任何低延迟匿名网络。这些攻击突出了流量分析领域与更传统的计算机安全问题(如隐蔽通道分析)之间的关系。我们的研究还强调,无法直接观察网络链接并不能阻止攻击者执行流量分析:攻击者可以使用匿名网络作为预言器来推断远程节点上的流量负载,以便执行流量分析。
{"title":"Low-cost traffic analysis of Tor","authors":"S. Murdoch, G. Danezis","doi":"10.1109/SP.2005.12","DOIUrl":"https://doi.org/10.1109/SP.2005.12","url":null,"abstract":"Tor is the second generation onion router supporting the anonymous transport of TCP streams over the Internet. Its low latency makes it very suitable for common tasks, such as Web browsing, but insecure against traffic-analysis attacks by a global passive adversary. We present new traffic-analysis techniques that allow adversaries with only a partial view of the network to infer which nodes are being used to relay the anonymous streams and therefore greatly reduce the anonymity provided by Tor. Furthermore, we show that otherwise unrelated streams can be linked back to the same initiator Our attack is feasible for the adversary anticipated by the Tor designers. Our theoretical attacks are backed up by experiments performed on the deployed, albeit experimental, Tor network. Our techniques should also be applicable to any low latency anonymous network. These attacks highlight the relationship between the field of traffic-analysis and more traditional computer security issues, such as covert channel analysis. Our research also highlights that the inability to directly observe network links does not prevent an attacker from performing traffic-analysis: the adversary can use the anonymising network as an oracle to infer the traffic load on remote nodes in order to perform traffic-analysis.","PeriodicalId":6366,"journal":{"name":"2005 IEEE Symposium on Security and Privacy (S&P'05)","volume":"1 1","pages":"183-195"},"PeriodicalIF":0.0,"publicationDate":"2005-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89273800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 649
期刊
2005 IEEE Symposium on Security and Privacy (S&P'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1