首页 > 最新文献

2017 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
SoK: Exploiting Network Printers SoK:利用网络打印机
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.47
Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk
The idea of a paperless office has been dreamed of for more than three decades. However, nowadays printers are still one of the most essential devices for daily work and common Internet users. Instead of removing them, printers evolved from simple devices into complex network computer systems, installed directly into company networks, and carrying considerable confidential data in their print jobs. This makes them to an attractive attack target. In this paper we conduct a large scale analysis of printer attacks and systematize our knowledge by providing a general methodology for security analyses of printers. Based on our methodology, we implemented an open-source tool called PRinter Exploitation Toolkit (PRET). We used PRET to evaluate 20 printer models from different vendors and found all of them to be vulnerable to at least one of the tested attacks. These attacks included, for example, simple DoS attacks or skilled attacks, extracting print jobs and system files. On top of our systematic analysis we reveal novel insights that enable attacks from the Internet by using advanced cross-site printing techniques, combined with printer CORS spoofing. Finally, we show how to apply our attacks to systems beyond typical printers like Google Cloud Print or document processing websites.
无纸化办公室的想法已经梦想了三十多年。然而,如今打印机仍然是日常工作和普通互联网用户最重要的设备之一。打印机没有被淘汰,而是从简单的设备演变成复杂的网络计算机系统,直接安装在公司网络中,在打印工作中携带大量机密数据。这使他们成为一个有吸引力的攻击目标。在本文中,我们对打印机攻击进行了大规模的分析,并通过提供打印机安全分析的一般方法来系统化我们的知识。基于我们的方法,我们实现了一个名为PRinter Exploitation Toolkit (PRET)的开源工具。我们使用PRET评估了来自不同供应商的20种打印机型号,发现它们都容易受到至少一种测试攻击的攻击。这些攻击包括,例如,简单的DoS攻击或熟练的攻击,提取打印作业和系统文件。在我们的系统分析之上,我们揭示了新的见解,通过使用先进的跨站点打印技术,结合打印机CORS欺骗,使互联网攻击成为可能。最后,我们将展示如何将我们的攻击应用于典型打印机(如Google Cloud Print或文档处理网站)以外的系统。
{"title":"SoK: Exploiting Network Printers","authors":"Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk","doi":"10.1109/SP.2017.47","DOIUrl":"https://doi.org/10.1109/SP.2017.47","url":null,"abstract":"The idea of a paperless office has been dreamed of for more than three decades. However, nowadays printers are still one of the most essential devices for daily work and common Internet users. Instead of removing them, printers evolved from simple devices into complex network computer systems, installed directly into company networks, and carrying considerable confidential data in their print jobs. This makes them to an attractive attack target. In this paper we conduct a large scale analysis of printer attacks and systematize our knowledge by providing a general methodology for security analyses of printers. Based on our methodology, we implemented an open-source tool called PRinter Exploitation Toolkit (PRET). We used PRET to evaluate 20 printer models from different vendors and found all of them to be vulnerable to at least one of the tested attacks. These attacks included, for example, simple DoS attacks or skilled attacks, extracting print jobs and system files. On top of our systematic analysis we reveal novel insights that enable attacks from the Internet by using advanced cross-site printing techniques, combined with printer CORS spoofing. Finally, we show how to apply our attacks to systems beyond typical printers like Google Cloud Print or document processing websites.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"140 1","pages":"213-230"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77733875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations SymCerts:用于暴露X.509证书验证实现中的不合规的实用符号执行
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.40
Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, C. Nita-Rotaru, Ninghui Li
The X.509 Public-Key Infrastructure has long been used in the SSL/TLS protocol to achieve authentication. A recent trend of Internet-of-Things (IoT) systems employing small footprint SSL/TLS libraries for secure communication has further propelled its prominence. The security guarantees provided by X.509 hinge on the assumption that the underlying implementation rigorously scrutinizes X.509 certificate chains, and accepts only the valid ones. Noncompliant implementations of X.509 can potentially lead to attacks and/or interoperability issues. In the literature, black-box fuzzing has been used to find flaws in X.509 validation implementations, fuzzing, however, cannot guarantee coverage and thus severe flaws may remain undetected. To thoroughly analyze X.509 implementations in small footprint SSL/TLS libraries, this paper takes the complementary approach of using symbolic execution. We observe that symbolic execution, a technique proven to be effective in finding software implementation flaws, can also be leveraged to expose noncompliance in X.509 implementations. Directly applying an off-the-shelf symbolic execution engine on SSL/TLS libraries is, however, not practical due to the problem of path explosion. To this end, we propose the use of SymCerts, which are X.509 certificate chains carefully constructed with a mixture of symbolic and concrete values. Utilizing SymCerts and some domain-specific optimizations, we symbolically execute the certificate chain validation code of each library and extract path constraints describing its accepting and rejecting certificate universes. These path constraints help us identify missing checks in different libraries. For exposing subtle but intricate noncompliance with X.509 standard, we cross-validate the constraints extracted from different libraries to find further implementation flaws. Our analysis of 9 small footprint X.509 implementations has uncovered 48 instances of noncompliance. Findings and suggestions provided by us have already been incorporated by developers into newer versions of their libraries.
长期以来,X.509公钥基础设施一直用于SSL/TLS协议中以实现身份验证。最近物联网(IoT)系统采用小足迹SSL/TLS库进行安全通信的趋势进一步推动了其突出地位。X.509提供的安全保证依赖于底层实现严格审查X.509证书链并只接受有效证书链的假设。不兼容的X.509实现可能会导致攻击和/或互操作性问题。在文献中,黑盒模糊测试已被用于发现X.509验证实现中的缺陷,然而,模糊测试不能保证覆盖范围,因此严重的缺陷可能仍未被检测到。为了彻底分析小内存占用SSL/TLS库中的X.509实现,本文采用了使用符号执行的补充方法。我们观察到符号执行,一种被证明在发现软件实现缺陷方面是有效的技术,也可以被用来暴露X.509实现中的不遵从性。然而,由于路径爆炸的问题,直接在SSL/TLS库上应用现成的符号执行引擎是不实际的。为此,我们建议使用SymCerts,它是精心构建的X.509证书链,混合了符号值和具体值。利用SymCerts和一些特定于域的优化,我们象征性地执行每个库的证书链验证代码,并提取描述其接受和拒绝证书宇宙的路径约束。这些路径约束帮助我们识别不同库中缺失的检查。为了暴露与X.509标准的微妙但复杂的不一致性,我们交叉验证从不同库中提取的约束,以发现进一步的实现缺陷。我们对9个小的X.509实现的分析发现了48个不符合的实例。我们提供的发现和建议已经被开发人员纳入到他们的库的新版本中。
{"title":"SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations","authors":"Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, C. Nita-Rotaru, Ninghui Li","doi":"10.1109/SP.2017.40","DOIUrl":"https://doi.org/10.1109/SP.2017.40","url":null,"abstract":"The X.509 Public-Key Infrastructure has long been used in the SSL/TLS protocol to achieve authentication. A recent trend of Internet-of-Things (IoT) systems employing small footprint SSL/TLS libraries for secure communication has further propelled its prominence. The security guarantees provided by X.509 hinge on the assumption that the underlying implementation rigorously scrutinizes X.509 certificate chains, and accepts only the valid ones. Noncompliant implementations of X.509 can potentially lead to attacks and/or interoperability issues. In the literature, black-box fuzzing has been used to find flaws in X.509 validation implementations, fuzzing, however, cannot guarantee coverage and thus severe flaws may remain undetected. To thoroughly analyze X.509 implementations in small footprint SSL/TLS libraries, this paper takes the complementary approach of using symbolic execution. We observe that symbolic execution, a technique proven to be effective in finding software implementation flaws, can also be leveraged to expose noncompliance in X.509 implementations. Directly applying an off-the-shelf symbolic execution engine on SSL/TLS libraries is, however, not practical due to the problem of path explosion. To this end, we propose the use of SymCerts, which are X.509 certificate chains carefully constructed with a mixture of symbolic and concrete values. Utilizing SymCerts and some domain-specific optimizations, we symbolically execute the certificate chain validation code of each library and extract path constraints describing its accepting and rejecting certificate universes. These path constraints help us identify missing checks in different libraries. For exposing subtle but intricate noncompliance with X.509 standard, we cross-validate the constraints extracted from different libraries to find further implementation flaws. Our analysis of 9 small footprint X.509 implementations has uncovered 48 instances of noncompliance. Findings and suggestions provided by us have already been incorporated by developers into newer versions of their libraries.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"44 1","pages":"503-520"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79955894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Scalable Bias-Resistant Distributed Randomness 可伸缩的抗偏性分布随机性
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.45
Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, M. Fischer, B. Ford
Bias-resistant public randomness is a critical component in many (distributed) protocols. Generating public randomness is hard, however, because active adversaries may behave dishonestly to bias public random choices toward their advantage. Existing solutions do not scale to hundreds or thousands of participants, as is needed in many decentralized systems. We propose two large-scale distributed protocols, RandHound and RandHerd, which provide publicly-verifiable, unpredictable, and unbiasable randomness against Byzantine adversaries. RandHound relies on an untrusted client to divide a set of randomness servers into groups for scalability, and it depends on the pigeonhole principle to ensure output integrity, even for non-random, adversarial group choices. RandHerd implements an efficient, decentralized randomness beacon. RandHerd is structurally similar to a BFT protocol, but uses RandHound in a one-time setup to arrange participants into verifiably unbiased random secret-sharing groups, which then repeatedly produce random output at predefined intervals. Our prototype demonstrates that RandHound and RandHerd achieve good performance across hundreds of participants while retaining a low failure probability by properly selecting protocol parameters, such as a group size and secret-sharing threshold. For example, when sharding 512 nodes into groups of 32, our experiments show that RandHound can produce fresh random output after 240 seconds. RandHerd, after a setup phase of 260 seconds, is able to generate fresh random output in intervals of approximately 6 seconds. For this configuration, both protocols operate at a failure probability of at most 0.08% against a Byzantine adversary.
抗偏性公共随机性是许多(分布式)协议的关键组成部分。然而,产生公共随机性是困难的,因为主动的对手可能会采取不诚实的行为,使公共随机选择对自己有利。现有的解决方案不能扩展到数百或数千个参与者,这是许多分散系统所需要的。我们提出了两个大规模分布式协议,RandHound和RandHerd,它们提供了针对拜占庭对手的可公开验证、不可预测和无偏倚的随机性。RandHound依赖于一个不可信的客户端来将一组随机服务器划分为可伸缩性组,它依赖于鸽子洞原则来确保输出的完整性,即使是非随机的,对抗性的组选择。RandHerd实现了一个高效、分散的随机信标。RandHerd在结构上类似于BFT协议,但在一次性设置中使用RandHound将参与者安排到可验证的无偏随机秘密共享组中,然后以预定义的间隔重复产生随机输出。我们的原型表明,通过正确选择协议参数(如组大小和秘密共享阈值),RandHound和RandHerd在数百个参与者中获得了良好的性能,同时保持了较低的故障概率。例如,当将512个节点分片为32组时,我们的实验表明,RandHound可以在240秒后产生新的随机输出。RandHerd在260秒的设置阶段之后,能够在大约6秒的间隔内生成新的随机输出。对于这种配置,两个协议在对抗拜占庭对手时的失败概率最多为0.08%。
{"title":"Scalable Bias-Resistant Distributed Randomness","authors":"Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, M. Fischer, B. Ford","doi":"10.1109/SP.2017.45","DOIUrl":"https://doi.org/10.1109/SP.2017.45","url":null,"abstract":"Bias-resistant public randomness is a critical component in many (distributed) protocols. Generating public randomness is hard, however, because active adversaries may behave dishonestly to bias public random choices toward their advantage. Existing solutions do not scale to hundreds or thousands of participants, as is needed in many decentralized systems. We propose two large-scale distributed protocols, RandHound and RandHerd, which provide publicly-verifiable, unpredictable, and unbiasable randomness against Byzantine adversaries. RandHound relies on an untrusted client to divide a set of randomness servers into groups for scalability, and it depends on the pigeonhole principle to ensure output integrity, even for non-random, adversarial group choices. RandHerd implements an efficient, decentralized randomness beacon. RandHerd is structurally similar to a BFT protocol, but uses RandHound in a one-time setup to arrange participants into verifiably unbiased random secret-sharing groups, which then repeatedly produce random output at predefined intervals. Our prototype demonstrates that RandHound and RandHerd achieve good performance across hundreds of participants while retaining a low failure probability by properly selecting protocol parameters, such as a group size and secret-sharing threshold. For example, when sharding 512 nodes into groups of 32, our experiments show that RandHound can produce fresh random output after 240 seconds. RandHerd, after a setup phase of 260 seconds, is able to generate fresh random output in intervals of approximately 6 seconds. For this configuration, both protocols operate at a failure probability of at most 0.08% against a Byzantine adversary.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"8 1","pages":"444-460"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89899450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 243
NEZHA: Efficient Domain-Independent Differential Testing 哪吒:高效的域无关差分测试
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.27
Theofilos Petsios, Adrian Tang, S. Stolfo, A. Keromytis, S. Jana
Differential testing uses similar programs as cross-referencing oracles to find semantic bugs that do not exhibit explicit erroneous behaviors like crashes or assertion failures. Unfortunately, existing differential testing tools are domain-specific and inefficient, requiring large numbers of test inputs to find a single bug. In this paper, we address these issues by designing and implementing NEZHA, an efficient input-format-agnostic differential testing framework. The key insight behind NEZHA's design is that current tools generate inputs by simply borrowing techniques designed for finding crash or memory corruption bugs in individual programs (e.g., maximizing code coverage). By contrast, NEZHA exploits the behavioral asymmetries between multiple test programs to focus on inputs that are more likely to trigger semantic bugs. We introduce the notion of δ-diversity, which summarizes the observed asymmetries between the behaviors of multiple test applications. Based on δ-diversity, we design two efficient domain-independent input generation mechanisms for differential testing, one gray-box and one black-box. We demonstrate that both of these input generation schemes are significantly more efficient than existing tools at finding semantic bugs in real-world, complex software. NEZHA's average rate of finding differences is 52 times and 27 times higher than that of Frankencerts and Mucerts, two popular domain-specific differential testing tools that check SSL/TLS certificate validation implementations, respectively. Moreover, performing differential testing with NEZHA results in 6 times more semantic bugs per tested input, compared to adapting state-of-the-art general-purpose fuzzers like American Fuzzy Lop (AFL) to differential testing by running them on individual test programs for input generation. NEZHA discovered 778 unique, previously unknown discrepancies across a wide variety of applications (ELF and XZ parsers, PDF viewers and SSL/TLS libraries), many of which constitute previously unknown critical security vulnerabilities. In particular, we found two critical evasion attacks against ClamAV, allowing arbitrary malicious ELF/XZ files to evade detection. The discrepancies NEZHA found in the X.509 certificate validation implementations of the tested SSL/TLS libraries range from mishandling certain types of KeyUsage extensions, to incorrect acceptance of specially crafted expired certificates, enabling man-in-the-middle attacks. All of our reported vulnerabilities have been confirmed and fixed within a week from the date of reporting.
差异测试使用类似的程序作为交叉引用oracle来查找语义错误,这些错误不会表现出明显的错误行为,如崩溃或断言失败。不幸的是,现有的差异测试工具是特定于领域的,并且效率低下,需要大量的测试输入才能找到单个错误。在本文中,我们通过设计和实现NEZHA来解决这些问题,NEZHA是一个有效的输入格式无关的差分测试框架。NEZHA设计背后的关键见解是,当前的工具通过简单地借用用于查找单个程序中的崩溃或内存损坏bug的技术(例如,最大化代码覆盖率)来生成输入。相比之下,NEZHA利用多个测试程序之间的行为不对称,专注于更有可能触发语义错误的输入。我们引入了δ分集的概念,它总结了在多个测试应用中观察到的行为之间的不对称性。基于δ-分集,设计了两种高效的域无关输入生成机制,分别为灰盒和黑盒。我们证明了这两种输入生成方案在寻找现实世界中复杂软件中的语义错误方面比现有的工具要有效得多。NEZHA发现差异的平均比率是Frankencerts和Mucerts的52倍和27倍,Frankencerts和Mucerts是两种流行的域特定差异测试工具,分别检查SSL/TLS证书验证实现。此外,与将美国Fuzzy Lop (AFL)等最先进的通用fuzzers应用于差分测试(通过在单个测试程序上运行它们来生成输入)相比,使用NEZHA执行差分测试会导致每个测试输入的语义错误增加6倍。NEZHA在各种应用程序(ELF和XZ解析器、PDF查看器和SSL/TLS库)中发现了778个独特的、以前未知的差异,其中许多都构成了以前未知的关键安全漏洞。特别是,我们发现了两个针对ClamAV的关键逃避攻击,允许任意恶意ELF/XZ文件逃避检测。NEZHA在测试的SSL/TLS库的X.509证书验证实现中发现的差异包括错误处理某些类型的KeyUsage扩展,错误地接受特殊制作的过期证书,从而启用中间人攻击。我们报告的所有漏洞都在报告之日起一周内得到确认和修复。
{"title":"NEZHA: Efficient Domain-Independent Differential Testing","authors":"Theofilos Petsios, Adrian Tang, S. Stolfo, A. Keromytis, S. Jana","doi":"10.1109/SP.2017.27","DOIUrl":"https://doi.org/10.1109/SP.2017.27","url":null,"abstract":"Differential testing uses similar programs as cross-referencing oracles to find semantic bugs that do not exhibit explicit erroneous behaviors like crashes or assertion failures. Unfortunately, existing differential testing tools are domain-specific and inefficient, requiring large numbers of test inputs to find a single bug. In this paper, we address these issues by designing and implementing NEZHA, an efficient input-format-agnostic differential testing framework. The key insight behind NEZHA's design is that current tools generate inputs by simply borrowing techniques designed for finding crash or memory corruption bugs in individual programs (e.g., maximizing code coverage). By contrast, NEZHA exploits the behavioral asymmetries between multiple test programs to focus on inputs that are more likely to trigger semantic bugs. We introduce the notion of δ-diversity, which summarizes the observed asymmetries between the behaviors of multiple test applications. Based on δ-diversity, we design two efficient domain-independent input generation mechanisms for differential testing, one gray-box and one black-box. We demonstrate that both of these input generation schemes are significantly more efficient than existing tools at finding semantic bugs in real-world, complex software. NEZHA's average rate of finding differences is 52 times and 27 times higher than that of Frankencerts and Mucerts, two popular domain-specific differential testing tools that check SSL/TLS certificate validation implementations, respectively. Moreover, performing differential testing with NEZHA results in 6 times more semantic bugs per tested input, compared to adapting state-of-the-art general-purpose fuzzers like American Fuzzy Lop (AFL) to differential testing by running them on individual test programs for input generation. NEZHA discovered 778 unique, previously unknown discrepancies across a wide variety of applications (ELF and XZ parsers, PDF viewers and SSL/TLS libraries), many of which constitute previously unknown critical security vulnerabilities. In particular, we found two critical evasion attacks against ClamAV, allowing arbitrary malicious ELF/XZ files to evade detection. The discrepancies NEZHA found in the X.509 certificate validation implementations of the tested SSL/TLS libraries range from mishandling certain types of KeyUsage extensions, to incorrect acceptance of specially crafted expired certificates, enabling man-in-the-middle attacks. All of our reported vulnerabilities have been confirmed and fixed within a week from the date of reporting.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"35 1","pages":"615-632"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91088225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees CoSMeDis:一个具有正式验证的保密保证的分布式社交媒体平台
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.24
Thomas Bauereiß, Armando Pesenti Gritti, A. Popescu, F. Raimondi
We present the design, implementation and information flow verification of CoSMeDis, a distributed social media platform. The system consists of an arbitrary number of communicating nodes, deployable at different locations over the Internet. Its registered users can post content and establish intra-node and inter-node friendships, used to regulate access control over the posts. The system's kernel has been verified in the proof assistant Isabelle/HOL and automatically extracted as Scala code. We formalized a framework for composing a class of information flow security guarantees in a distributed system, applicable to input/output automata. We instantiated this framework to confidentiality properties for CoSMeDis's sources of information: posts, friendship requests, and friendship status.
本文介绍了分布式社交媒体平台CoSMeDis的设计、实现和信息流验证。该系统由任意数量的通信节点组成,可通过Internet部署在不同位置。它的注册用户可以发布内容,并建立节点内和节点间的友谊,用于规范对帖子的访问控制。系统的内核在证明助手Isabelle/HOL中进行了验证,并自动提取为Scala代码。我们形式化了一个框架,用于在分布式系统中组成一类信息流安全保证,适用于输入/输出自动机。我们将这个框架实例化为CoSMeDis信息源的机密属性:帖子、好友请求和好友状态。
{"title":"CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees","authors":"Thomas Bauereiß, Armando Pesenti Gritti, A. Popescu, F. Raimondi","doi":"10.1109/SP.2017.24","DOIUrl":"https://doi.org/10.1109/SP.2017.24","url":null,"abstract":"We present the design, implementation and information flow verification of CoSMeDis, a distributed social media platform. The system consists of an arbitrary number of communicating nodes, deployable at different locations over the Internet. Its registered users can post content and establish intra-node and inter-node friendships, used to regulate access control over the posts. The system's kernel has been verified in the proof assistant Isabelle/HOL and automatically extracted as Scala code. We formalized a framework for composing a class of information flow security guarantees in a distributed system, applicable to input/output automata. We instantiated this framework to confidentiality properties for CoSMeDis's sources of information: posts, friendship requests, and friendship status.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"88 1","pages":"729-748"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86701355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits 你的漏洞是我的:自动Shellcode移植远程攻击
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.67
Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley
Developing a remote exploit is not easy. It requires a comprehensive understanding of a vulnerability and delicate techniques to bypass defense mechanisms. As a result, attackers may prefer to reuse an existing exploit and make necessary changes over developing a new exploit from scratch. One such adaptation is the replacement of the original shellcode (i.e., the attacker-injected code that is executed as the final step of the exploit) in the original exploit with a replacement shellcode, resulting in a modified exploit that carries out the actions desired by the attacker as opposed to the original exploit author. We call this a shellcode transplant. Current automated shellcode placement methods are insufficient because they over-constrain the replacement shellcode, and so cannot be used to achieve shellcode transplant. For example, these systems consider the shellcode as an integrated memory chunk and require that the execution path of the modified exploit must be same as the original one. To resolve these issues, we present ShellSwap, a system that uses symbolic tracing, with a combination of shellcode layout remediation and path kneading to achieve shellcode transplant. We evaluated the ShellSwap system on a combination of 20 exploits and 5 pieces of shellcode that are independently developed and different from the original exploit. Among the 100 test cases, our system successfully generated 88% of the exploits.
开发远程攻击并不容易。它需要对漏洞的全面理解和绕过防御机制的精细技术。因此,攻击者可能更喜欢重用现有的漏洞并进行必要的更改,而不是从头开始开发新的漏洞。一种这样的适应是用替换的shellcode替换原始漏洞中的原始shellcode(即,作为漏洞利用的最后一步执行的攻击者注入的代码),从而产生修改后的漏洞利用,该漏洞利用执行攻击者所需的操作,而不是原始漏洞利用的作者。我们称之为shellcode移植。当前的自动shellcode放置方法是不够的,因为它们过度约束了替换的shellcode,因此不能用于实现shellcode移植。例如,这些系统将shellcode视为一个集成的内存块,并要求修改后的漏洞的执行路径必须与原始的相同。为了解决这些问题,我们提出了ShellSwap,这是一个使用符号跟踪的系统,结合了shellcode布局修复和路径处理来实现shellcode移植。我们评估了ShellSwap系统的20个漏洞和5个独立开发的、不同于原始漏洞的shellcode。在100个测试用例中,我们的系统成功地生成了88%的漏洞。
{"title":"Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits","authors":"Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley","doi":"10.1109/SP.2017.67","DOIUrl":"https://doi.org/10.1109/SP.2017.67","url":null,"abstract":"Developing a remote exploit is not easy. It requires a comprehensive understanding of a vulnerability and delicate techniques to bypass defense mechanisms. As a result, attackers may prefer to reuse an existing exploit and make necessary changes over developing a new exploit from scratch. One such adaptation is the replacement of the original shellcode (i.e., the attacker-injected code that is executed as the final step of the exploit) in the original exploit with a replacement shellcode, resulting in a modified exploit that carries out the actions desired by the attacker as opposed to the original exploit author. We call this a shellcode transplant. Current automated shellcode placement methods are insufficient because they over-constrain the replacement shellcode, and so cannot be used to achieve shellcode transplant. For example, these systems consider the shellcode as an integrated memory chunk and require that the execution path of the modified exploit must be same as the original one. To resolve these issues, we present ShellSwap, a system that uses symbolic tracing, with a combination of shellcode layout remediation and path kneading to achieve shellcode transplant. We evaluated the ShellSwap system on a combination of 20 exploits and 5 pieces of shellcode that are independently developed and different from the original exploit. Among the 100 test cases, our system successfully generated 88% of the exploits.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"34 1","pages":"824-839"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88041905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation 通过取消隐式特权提升来加强Java的访问控制
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.16
Philipp Holzinger, Ben Hermann, Johannes Lerch, E. Bodden, M. Mezini
While the Java runtime is installed on billions of devices and servers worldwide, it remains a primary attack vector for online criminals. As recent studies show, the majority of all exploited Java vulnerabilities comprise incorrect or insufficient implementations of access-control checks. This paper for the first time studies the problem in depth. As we find, attacks are enabled by shortcuts that short-circuit Java's general principle of stack-based access control. These shortcuts, originally introduced for ease of use and to improve performance, cause Java to elevate the privileges of code implicitly. As we show, this creates many pitfalls for software maintenance, making it all too easy for maintainers of the runtime to introduce blatant confused-deputy vulnerabilities even by just applying normally semantics-preserving refactorings. How can this problem be solved? Can one implement Java's access control without shortcuts, and if so, does this implementation remain usable and efficient? To answer those questions, we conducted a tool-assisted adaptation of the Java Class Library (JCL), avoiding (most) shortcuts and therefore moving to a fully explicit model of privilege elevation. As we show, the proposed changes significantly harden the JCL against attacks: they effectively hinder the introduction of new confused-deputy vulnerabilities in future library versions, and successfully restrict the capabilities of attackers when exploiting certain existing vulnerabilities. We discuss usability considerations, and through a set of large-scale experiments show that with current JVM technology such a faithful implementation of stack-based access control induces no observable performance loss.
虽然Java运行时安装在全球数十亿的设备和服务器上,但它仍然是在线犯罪分子的主要攻击媒介。正如最近的研究表明的那样,大多数被利用的Java漏洞包括访问控制检查的不正确或不充分的实现。本文首次对这一问题进行了深入的研究。正如我们所发现的,攻击是通过快捷方式实现的,这些快捷方式使Java基于堆栈的访问控制的一般原则短路。这些快捷方式最初是为了方便使用和提高性能而引入的,它们导致Java隐式地提升代码的特权。正如我们所展示的,这为软件维护创造了许多陷阱,使得运行时的维护者很容易引入明显的混淆代理漏洞,即使只是通过应用正常的语义保留重构。如何解决这个问题?可以在没有快捷方式的情况下实现Java的访问控制吗?如果可以,这种实现是否仍然可用且高效?为了回答这些问题,我们对Java类库(JCL)进行了工具辅助的改编,避免了(大多数)快捷方式,因此转向了完全显式的特权提升模型。正如我们所展示的,提议的更改显著地增强了JCL对攻击的抵抗力:它们有效地阻止了在未来的库版本中引入新的混淆代理漏洞,并成功地限制了攻击者利用某些现有漏洞的能力。我们讨论了可用性方面的考虑,并通过一组大规模实验表明,使用当前的JVM技术,这种基于堆栈的访问控制的忠实实现不会导致可观察到的性能损失。
{"title":"Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation","authors":"Philipp Holzinger, Ben Hermann, Johannes Lerch, E. Bodden, M. Mezini","doi":"10.1109/SP.2017.16","DOIUrl":"https://doi.org/10.1109/SP.2017.16","url":null,"abstract":"While the Java runtime is installed on billions of devices and servers worldwide, it remains a primary attack vector for online criminals. As recent studies show, the majority of all exploited Java vulnerabilities comprise incorrect or insufficient implementations of access-control checks. This paper for the first time studies the problem in depth. As we find, attacks are enabled by shortcuts that short-circuit Java's general principle of stack-based access control. These shortcuts, originally introduced for ease of use and to improve performance, cause Java to elevate the privileges of code implicitly. As we show, this creates many pitfalls for software maintenance, making it all too easy for maintainers of the runtime to introduce blatant confused-deputy vulnerabilities even by just applying normally semantics-preserving refactorings. How can this problem be solved? Can one implement Java's access control without shortcuts, and if so, does this implementation remain usable and efficient? To answer those questions, we conducted a tool-assisted adaptation of the Java Class Library (JCL), avoiding (most) shortcuts and therefore moving to a fully explicit model of privilege elevation. As we show, the proposed changes significantly harden the JCL against attacks: they effectively hinder the introduction of new confused-deputy vulnerabilities in future library versions, and successfully restrict the capabilities of attackers when exploiting certain existing vulnerabilities. We discuss usability considerations, and through a set of large-scale experiments show that with current JVM technology such a faithful implementation of stack-based access control induces no observable performance loss.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"6 1","pages":"1027-1040"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87492603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases vSQL:验证动态外包数据库上的任意SQL查询
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.43
Yupeng Zhang, Daniel Genkin, Jonathan Katz, D. Papadopoulos, Charalampos Papamanthou
Cloud database systems such as Amazon RDS or Google Cloud SQLenable the outsourcing of a large database to a server who then responds to SQL queries. A natural problem here is to efficiently verify the correctness of responses returned by the (untrusted) server. In this paper we present vSQL, a novel cryptographic protocol for publicly verifiable SQL queries on dynamic databases. At a high level, our construction relies on two extensions of the CMT interactive-proof protocol [Cormode et al., 2012]: (i) supporting outsourced input via the use of a polynomial-delegation protocol with succinct proofs, and (ii) supporting auxiliary input (i.e., non-deterministic computation) efficiently. Compared to previous verifiable-computation systems based on interactive proofs, our construction has verification cost polylogarithmic in the auxiliary input (which for SQL queries can be as large as the database) rather than linear. In order to evaluate the performance and expressiveness of our scheme, we tested it on SQL queries based on the TPC-H benchmark on a database with 6 million rows and 13 columns. The server overhead in our scheme (which is typically the main bottleneck) is up to 120 times lower than previousapproaches based on succinct arguments of knowledge (SNARKs), and moreover we avoid the need for query-dependent pre-processing which is required by optimized SNARK-based schemes. In our construction, the server/client time and the communication cost are comparable to, and sometimessmaller than, those of existing customized solutions which only support specific queries.
云数据库系统(如Amazon RDS或Google Cloud SQLenable)可以将大型数据库外包给服务器,然后由服务器响应SQL查询。这里的一个自然问题是有效地验证(不受信任的)服务器返回的响应的正确性。本文提出了一种用于动态数据库上可公开验证的SQL查询的新型加密协议vSQL。在高层次上,我们的构建依赖于CMT交互证明协议的两个扩展[Cormode等人,2012]:(i)通过使用具有简洁证明的多项式委托协议来支持外包输入,以及(ii)有效地支持辅助输入(即非确定性计算)。与以前基于交互式证明的可验证计算系统相比,我们的结构在辅助输入(SQL查询可以与数据库一样大)中具有多对数的验证成本,而不是线性的。为了评估我们的方案的性能和表达能力,我们在一个600万行13列的数据库上基于TPC-H基准测试了它的SQL查询。我们方案中的服务器开销(通常是主要瓶颈)比以前基于简洁知识参数(SNARKs)的方法低120倍,而且我们避免了查询相关预处理的需要,而这是基于SNARKs的优化方案所需要的。在我们的构建中,服务器/客户端时间和通信成本与仅支持特定查询的现有定制解决方案相当,有时甚至更小。
{"title":"vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases","authors":"Yupeng Zhang, Daniel Genkin, Jonathan Katz, D. Papadopoulos, Charalampos Papamanthou","doi":"10.1109/SP.2017.43","DOIUrl":"https://doi.org/10.1109/SP.2017.43","url":null,"abstract":"Cloud database systems such as Amazon RDS or Google Cloud SQLenable the outsourcing of a large database to a server who then responds to SQL queries. A natural problem here is to efficiently verify the correctness of responses returned by the (untrusted) server. In this paper we present vSQL, a novel cryptographic protocol for publicly verifiable SQL queries on dynamic databases. At a high level, our construction relies on two extensions of the CMT interactive-proof protocol [Cormode et al., 2012]: (i) supporting outsourced input via the use of a polynomial-delegation protocol with succinct proofs, and (ii) supporting auxiliary input (i.e., non-deterministic computation) efficiently. Compared to previous verifiable-computation systems based on interactive proofs, our construction has verification cost polylogarithmic in the auxiliary input (which for SQL queries can be as large as the database) rather than linear. In order to evaluate the performance and expressiveness of our scheme, we tested it on SQL queries based on the TPC-H benchmark on a database with 6 million rows and 13 columns. The server overhead in our scheme (which is typically the main bottleneck) is up to 120 times lower than previousapproaches based on succinct arguments of knowledge (SNARKs), and moreover we avoid the need for query-dependent pre-processing which is required by optimized SNARK-based schemes. In our construction, the server/client time and the communication cost are comparable to, and sometimessmaller than, those of existing customized solutions which only support specific queries.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"863-880"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83572526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts 一尘不染的沙箱:使用磨损工件逃避恶意软件分析系统
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.42
N. Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, M. Polychronakis
Malware sandboxes, widely used by antivirus companies, mobile application marketplaces, threat detection appliances, and security researchers, face the challenge of environment-aware malware that alters its behavior once it detects that it is being executed on an analysis environment. Recent efforts attempt to deal with this problem mostly by ensuring that well-known properties of analysis environments are replaced with realistic values, and that any instrumentation artifacts remain hidden. For sandboxes implemented using virtual machines, this can be achieved by scrubbing vendor-specific drivers, processes, BIOS versions, and other VM-revealing indicators, while more sophisticated sandboxes move away from emulation-based and virtualization-based systems towards bare-metal hosts. We observe that as the fidelity and transparency of dynamic malware analysis systems improves, malware authors can resort to other system characteristics that are indicative of artificial environments. We present a novel class of sandbox evasion techniques that exploit the "wear and tear" that inevitably occurs on real systems as a result of normal use. By moving beyond how realistic a system looks like, to how realistic its past use looks like, malware can effectively evade even sandboxes that do not expose any instrumentation indicators, including bare-metal systems. We investigate the feasibility of this evasion strategy by conducting a large-scale study of wear-and-tear artifacts collected from real user devices and publicly available malware analysis services. The results of our evaluation are alarming: using simple decision trees derived from the analyzed data, malware can determine that a system is an artificial environment and not a real user device with an accuracy of 92.86%. As a step towards defending against wear-and-tear malware evasion, we develop statistical models that capture a system's age and degree of use, which can be used to aid sandbox operators in creating system images that exhibit a realistic wear-and-tear state.
恶意软件沙箱被反病毒公司、移动应用程序市场、威胁检测设备和安全研究人员广泛使用,它面临着环境感知恶意软件的挑战,一旦检测到它正在分析环境中执行,它就会改变其行为。最近的努力试图处理这个问题,主要是通过确保分析环境的众所周知的属性被实际的值所取代,并且任何仪器工件都是隐藏的。对于使用虚拟机实现的沙箱,这可以通过清除特定于供应商的驱动程序、进程、BIOS版本和其他vm指示符来实现,而更复杂的沙箱则从基于仿真和虚拟化的系统转向裸机主机。我们观察到,随着动态恶意软件分析系统的保真度和透明度的提高,恶意软件作者可以求助于表明人工环境的其他系统特征。我们提出了一种新型的沙盒规避技术,该技术利用了由于正常使用而不可避免地在实际系统中发生的“磨损”。通过超越系统的逼真程度,达到其过去使用的逼真程度,恶意软件甚至可以有效地避开没有暴露任何仪表指标的沙箱,包括裸机系统。我们通过对从真实用户设备和公开可用的恶意软件分析服务收集的磨损工件进行大规模研究,来调查这种规避策略的可行性。我们的评估结果令人震惊:使用从分析数据中得出的简单决策树,恶意软件可以确定系统是人工环境而不是真正的用户设备,准确率为92.86%。作为防御磨损恶意软件逃避的一步,我们开发了统计模型来捕获系统的年龄和使用程度,这可以用来帮助沙箱操作员创建显示真实磨损状态的系统映像。
{"title":"Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts","authors":"N. Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, M. Polychronakis","doi":"10.1109/SP.2017.42","DOIUrl":"https://doi.org/10.1109/SP.2017.42","url":null,"abstract":"Malware sandboxes, widely used by antivirus companies, mobile application marketplaces, threat detection appliances, and security researchers, face the challenge of environment-aware malware that alters its behavior once it detects that it is being executed on an analysis environment. Recent efforts attempt to deal with this problem mostly by ensuring that well-known properties of analysis environments are replaced with realistic values, and that any instrumentation artifacts remain hidden. For sandboxes implemented using virtual machines, this can be achieved by scrubbing vendor-specific drivers, processes, BIOS versions, and other VM-revealing indicators, while more sophisticated sandboxes move away from emulation-based and virtualization-based systems towards bare-metal hosts. We observe that as the fidelity and transparency of dynamic malware analysis systems improves, malware authors can resort to other system characteristics that are indicative of artificial environments. We present a novel class of sandbox evasion techniques that exploit the \"wear and tear\" that inevitably occurs on real systems as a result of normal use. By moving beyond how realistic a system looks like, to how realistic its past use looks like, malware can effectively evade even sandboxes that do not expose any instrumentation indicators, including bare-metal systems. We investigate the feasibility of this evasion strategy by conducting a large-scale study of wear-and-tear artifacts collected from real user devices and publicly available malware analysis services. The results of our evaluation are alarming: using simple decision trees derived from the analyzed data, malware can determine that a system is an artificial environment and not a real user device with an accuracy of 92.86%. As a step towards defending against wear-and-tear malware evasion, we develop statistical models that capture a system's age and degree of use, which can be used to aid sandbox operators in creating system images that exhibit a realistic wear-and-tear state.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"1009-1024"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79730549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
An Experimental Security Analysis of an Industrial Robot Controller 工业机器人控制器的实验安全性分析
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.20
Davide Quarta, Marcello Pogliani, Mario Polino, F. Maggi, A. Zanchettin, S. Zanero
Industrial robots, automated manufacturing, and efficient logistics processes are at the heart of the upcoming fourth industrial revolution. While there are seminal studies on the vulnerabilities of cyber-physical systems in the industry, as of today there has been no systematic analysis of the security of industrial robot controllers. We examine the standard architecture of an industrial robot and analyze a concrete deployment from a systems security standpoint. Then, we propose an attacker model and confront it with the minimal set of requirements that industrial robots should honor: precision in sensing the environment, correctness in execution of control logic, and safety for human operators. Following an experimental and practical approach, we then show how our modeled attacker can subvert such requirements through the exploitation of software vulnerabilities, leading to severe consequences that are unique to the robotics domain. We conclude by discussing safety standards and security challenges in industrial robotics.
工业机器人、自动化制造和高效物流流程是即将到来的第四次工业革命的核心。虽然对工业中网络物理系统的漏洞进行了开创性的研究,但到目前为止,还没有对工业机器人控制器的安全性进行系统分析。我们将研究工业机器人的标准体系结构,并从系统安全的角度分析具体部署。然后,我们提出了一个攻击者模型,并面对工业机器人应该遵守的最小要求集:感知环境的精度,执行控制逻辑的正确性以及人类操作员的安全性。遵循实验和实际的方法,然后我们展示了我们建模的攻击者如何通过利用软件漏洞来破坏这些需求,从而导致机器人领域独有的严重后果。最后,我们讨论了工业机器人的安全标准和安全挑战。
{"title":"An Experimental Security Analysis of an Industrial Robot Controller","authors":"Davide Quarta, Marcello Pogliani, Mario Polino, F. Maggi, A. Zanchettin, S. Zanero","doi":"10.1109/SP.2017.20","DOIUrl":"https://doi.org/10.1109/SP.2017.20","url":null,"abstract":"Industrial robots, automated manufacturing, and efficient logistics processes are at the heart of the upcoming fourth industrial revolution. While there are seminal studies on the vulnerabilities of cyber-physical systems in the industry, as of today there has been no systematic analysis of the security of industrial robot controllers. We examine the standard architecture of an industrial robot and analyze a concrete deployment from a systems security standpoint. Then, we propose an attacker model and confront it with the minimal set of requirements that industrial robots should honor: precision in sensing the environment, correctness in execution of control logic, and safety for human operators. Following an experimental and practical approach, we then show how our modeled attacker can subvert such requirements through the exploitation of software vulnerabilities, leading to severe consequences that are unique to the robotics domain. We conclude by discussing safety standards and security challenges in industrial robotics.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"35 1","pages":"268-286"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77311159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 136
期刊
2017 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1