首页 > 最新文献

2020 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
A Tale of Sea and Sky On the Security of Maritime VSAT Communications 论海上VSAT通信的安全性
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00056
James Pavur, Daniel Moser, Martin Strohmeier, Vincent Lenders, I. Martinovic
Very Small Aperture Terminals (VSAT) have revolutionized maritime operations. However, the security dimensions of maritime VSAT services are not well understood. Historically, high equipment costs have acted as a barrier to entry for both researchers and attackers. In this paper we demonstrate a substantial change in threat model, proving practical attacks against maritime VSAT networks with less than $400 of widely-available television equipment. This is achieved through GSExtract, a purpose-built forensic tool which enables the extraction of IP traffic from highly corrupted VSAT data streams.The implications of this threat are assessed experimentally through the analysis of more than 1.3 TB of real-world maritime VSAT recordings encompassing 26 million square kilometers of coverage area. The underlying network platform employed in these systems is representative of more than 60% of the global maritime VSAT services market. We find that sensitive data belonging to some of the world's largest maritime companies is regularly leaked over VSAT ship-to-shore communications. This threat is contextualized through illustrative case studies ranging from the interception and alteration of navigational charts to theft of passport and credit card details. Beyond this, we demonstrate the ability to arbitrarily intercept and modify TCP sessions under certain network configurations, enabling man-in-the-middle and denial of service attacks against ships at sea. The paper concludes with a brief discussion of the unique requirements and challenges for encryption in VSAT environments.
甚小孔径终端(VSAT)已经彻底改变了海上作业。然而,海上VSAT服务的安全层面还没有得到很好的理解。从历史上看,高昂的设备成本一直是研究人员和攻击者进入的障碍。在本文中,我们展示了威胁模型的重大变化,证明了使用不到400美元的广泛可用的电视设备对海上VSAT网络的实际攻击。这是通过GSExtract实现的,GSExtract是一种专用的取证工具,可以从高度损坏的VSAT数据流中提取IP流量。通过分析超过1.3 TB的真实海上VSAT记录,覆盖2600万平方公里的覆盖区域,对这一威胁的影响进行了实验评估。这些系统所采用的基础网络平台占全球海上VSAT服务市场的60%以上。我们发现,属于一些世界上最大的海事公司的敏感数据经常通过VSAT船岸通信泄露。从拦截和更改航海图到窃取护照和信用卡详细信息,通过说明性案例研究将这种威胁置于背景中。除此之外,我们还展示了在某些网络配置下任意拦截和修改TCP会话的能力,从而可以对海上船舶进行中间人攻击和拒绝服务攻击。本文最后简要讨论了VSAT环境下加密的独特要求和挑战。
{"title":"A Tale of Sea and Sky On the Security of Maritime VSAT Communications","authors":"James Pavur, Daniel Moser, Martin Strohmeier, Vincent Lenders, I. Martinovic","doi":"10.1109/SP40000.2020.00056","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00056","url":null,"abstract":"Very Small Aperture Terminals (VSAT) have revolutionized maritime operations. However, the security dimensions of maritime VSAT services are not well understood. Historically, high equipment costs have acted as a barrier to entry for both researchers and attackers. In this paper we demonstrate a substantial change in threat model, proving practical attacks against maritime VSAT networks with less than $400 of widely-available television equipment. This is achieved through GSExtract, a purpose-built forensic tool which enables the extraction of IP traffic from highly corrupted VSAT data streams.The implications of this threat are assessed experimentally through the analysis of more than 1.3 TB of real-world maritime VSAT recordings encompassing 26 million square kilometers of coverage area. The underlying network platform employed in these systems is representative of more than 60% of the global maritime VSAT services market. We find that sensitive data belonging to some of the world's largest maritime companies is regularly leaked over VSAT ship-to-shore communications. This threat is contextualized through illustrative case studies ranging from the interception and alteration of navigational charts to theft of passport and credit card details. Beyond this, we demonstrate the ability to arbitrarily intercept and modify TCP sessions under certain network configurations, enabling man-in-the-middle and denial of service attacks against ships at sea. The paper concludes with a brief discussion of the unique requirements and challenges for encryption in VSAT environments.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"54 1","pages":"1384-1400"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81334339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation JIT泄漏:通过即时编译诱导时序侧通道
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00007
Tegan Brennan, Nicolás Rosner, T. Bultan
Side-channel vulnerabilities in software are caused by an observable imbalance in resource usage across different program paths. We show that just-in-time (JIT) compilation, which is crucial to the runtime performance of modern interpreted languages, can introduce timing side channels in cases where the input distribution to the program is non-uniform. Such timing channels can enable an attacker to infer potentially sensitive information about predicates on the program input.We define three attack models under which such side channels are harnessable and five vulnerability templates to detect susceptible code fragments and predicates. We also propose profiling algorithms to generate the representative statistical information necessary for the attacker to perform accurate inference.We systematically evaluate the strength of these JIT-based side channels on the java.lang.String, java.lang.Math, and java.math.BigInteger classes from the Java standard library, and on the JavaScript built-in objects String, Math, and Array. We carry out our evaluation using two widely adopted, open-source, JIT-enhanced runtime engines for the Java and JavaScript languages: the Oracle HotSpot Java Virtual Machine and the Google V8 JavaScript engine, respectively.Finally, we demonstrate a few examples of JIT-based side channels in the Apache Shiro security framework and the GraphHopper route planning server, and show that they are observable over the public Internet.
软件中的侧信道漏洞是由不同程序路径上资源使用的明显不平衡引起的。我们展示了即时(JIT)编译对现代解释型语言的运行时性能至关重要,它可以在程序的输入分布不均匀的情况下引入时序侧通道。这样的定时通道可以使攻击者推断有关程序输入上的谓词的潜在敏感信息。我们定义了三种可以利用这些侧通道的攻击模型和五个漏洞模板来检测易受影响的代码片段和谓词。我们还提出了分析算法来生成攻击者执行准确推理所需的代表性统计信息。我们系统地评估了java.lang上这些基于jit的侧通道的强度。字符串,. lang。Java标准库中的Math和Java . Math . biginteger类,以及JavaScript内置对象String、Math和Array。我们使用两个广泛采用的、开源的、jit增强的Java和JavaScript语言运行时引擎进行评估:Oracle HotSpot Java Virtual Machine和谷歌V8 JavaScript引擎。最后,我们在Apache Shiro安全框架和GraphHopper路由规划服务器中演示了几个基于jit的侧通道示例,并展示了它们在公共Internet上是可观察的。
{"title":"JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation","authors":"Tegan Brennan, Nicolás Rosner, T. Bultan","doi":"10.1109/SP40000.2020.00007","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00007","url":null,"abstract":"Side-channel vulnerabilities in software are caused by an observable imbalance in resource usage across different program paths. We show that just-in-time (JIT) compilation, which is crucial to the runtime performance of modern interpreted languages, can introduce timing side channels in cases where the input distribution to the program is non-uniform. Such timing channels can enable an attacker to infer potentially sensitive information about predicates on the program input.We define three attack models under which such side channels are harnessable and five vulnerability templates to detect susceptible code fragments and predicates. We also propose profiling algorithms to generate the representative statistical information necessary for the attacker to perform accurate inference.We systematically evaluate the strength of these JIT-based side channels on the java.lang.String, java.lang.Math, and java.math.BigInteger classes from the Java standard library, and on the JavaScript built-in objects String, Math, and Array. We carry out our evaluation using two widely adopted, open-source, JIT-enhanced runtime engines for the Java and JavaScript languages: the Oracle HotSpot Java Virtual Machine and the Google V8 JavaScript engine, respectively.Finally, we demonstrate a few examples of JIT-based side channels in the Apache Shiro security framework and the GraphHopper route planning server, and show that they are observable over the public Internet.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"29 1","pages":"1207-1222"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87331063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
RAMBleed: Reading Bits in Memory Without Accessing Them RAMBleed:读取内存中的位而不访问它们
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00020
Andrew Kwong, Daniel Genkin, D. Gruss, Y. Yarom
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged adversary to flip the values of bits in neighboring rows on the memory module. Previous work has exploited this for various types of fault attacks across security boundaries, where the attacker flips inaccessible bits, often resulting in privilege escalation. It is widely assumed however, that bit flips within the adversary’s own private memory have no security implications, as the attacker can already modify its private memory via regular write operations.We demonstrate that this assumption is incorrect, by employing Rowhammer as a read side channel. More specifically, we show how an unprivileged attacker can exploit the data dependence between Rowhammer induced bit flips and the bits in nearby rows to deduce these bits, including values belonging to other processes and the kernel. Thus, the primary contribution of this work is to show that Rowhammer is a threat to not only integrity, but to confidentiality as well.Furthermore, in contrast to Rowhammer write side channels, which require persistent bit flips, our read channel succeeds even when ECC memory detects and corrects every bit flip. Thus, we demonstrate the first security implication of successfully-corrected bit flips, which were previously considered benign.To demonstrate the implications of this read side channel, we present an end-to-end attack on OpenSSH 7.9 that extracts an RSA-2048 key from the root level SSH daemon. To accomplish this, we develop novel techniques for massaging memory from user space into an exploitable state, and use the DRAM rowbuffer timing side channel to locate physically contiguous memory necessary for double-sided Rowhammering. Unlike previous Rowhammer attacks, our attack does not require the use of huge pages, and it works on Ubuntu Linux under its default configuration settings.
Rowhammer错误是DRAM单元中的一个可靠性问题,它可以使非特权攻击者翻转内存模块上相邻行的位值。以前的工作已经将此用于跨安全边界的各种类型的错误攻击,其中攻击者翻转不可访问的位,通常导致特权升级。然而,人们普遍认为,攻击者自己私有内存中的位翻转没有安全隐患,因为攻击者已经可以通过常规写操作修改其私有内存。我们通过使用Rowhammer作为读侧通道来证明这种假设是不正确的。更具体地说,我们展示了非特权攻击者如何利用Rowhammer诱导的位翻转和附近行中的位之间的数据依赖来推断这些位,包括属于其他进程和内核的值。因此,这项工作的主要贡献是表明Rowhammer不仅对完整性构成威胁,而且对保密性也构成威胁。此外,与需要持续位翻转的Rowhammer写侧通道相比,我们的读通道即使在ECC存储器检测并纠正每个位翻转时也能成功。因此,我们证明了成功校正位翻转的第一个安全含义,这在以前被认为是良性的。为了演示这个读侧通道的含义,我们提出了一个针对OpenSSH 7.9的端到端攻击,该攻击从根级SSH守护进程提取一个RSA-2048密钥。为了实现这一目标,我们开发了一种新的技术,将内存从用户空间转移到可利用的状态,并使用DRAM行缓冲定时侧信道来定位双面rowhamering所需的物理连续内存。与以前的Rowhammer攻击不同,我们的攻击不需要使用巨大的页面,并且它在默认配置设置下在Ubuntu Linux上工作。
{"title":"RAMBleed: Reading Bits in Memory Without Accessing Them","authors":"Andrew Kwong, Daniel Genkin, D. Gruss, Y. Yarom","doi":"10.1109/SP40000.2020.00020","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00020","url":null,"abstract":"The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged adversary to flip the values of bits in neighboring rows on the memory module. Previous work has exploited this for various types of fault attacks across security boundaries, where the attacker flips inaccessible bits, often resulting in privilege escalation. It is widely assumed however, that bit flips within the adversary’s own private memory have no security implications, as the attacker can already modify its private memory via regular write operations.We demonstrate that this assumption is incorrect, by employing Rowhammer as a read side channel. More specifically, we show how an unprivileged attacker can exploit the data dependence between Rowhammer induced bit flips and the bits in nearby rows to deduce these bits, including values belonging to other processes and the kernel. Thus, the primary contribution of this work is to show that Rowhammer is a threat to not only integrity, but to confidentiality as well.Furthermore, in contrast to Rowhammer write side channels, which require persistent bit flips, our read channel succeeds even when ECC memory detects and corrects every bit flip. Thus, we demonstrate the first security implication of successfully-corrected bit flips, which were previously considered benign.To demonstrate the implications of this read side channel, we present an end-to-end attack on OpenSSH 7.9 that extracts an RSA-2048 key from the root level SSH daemon. To accomplish this, we develop novel techniques for massaging memory from user space into an exploitable state, and use the DRAM rowbuffer timing side channel to locate physically contiguous memory necessary for double-sided Rowhammering. Unlike previous Rowhammer attacks, our attack does not require the use of huge pages, and it works on Ubuntu Linux under its default configuration settings.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"56 1","pages":"695-711"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85716389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning PMP:具有概率内存预规划的成本效益强制执行
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00035
Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, C. Harmon, X. Zhang
Malware is a prominent security threat and exposing malware behavior is a critical challenge. Recent malware often has payload that is only released when certain conditions are satisfied. It is hence difficult to fully disclose the payload by simply executing the malware. In addition, malware samples may be equipped with cloaking techniques such as VM detectors that stop execution once detecting that the malware is being monitored. Forced execution is a highly effective method to penetrate malware self-protection and expose hidden behavior, by forcefully setting certain branch outcomes. However, an existing state-of-the-art forced execution technique X-Force is very heavyweight, requiring tracing individual instructions, reasoning about pointer alias relations on-the-fly, and repairing invalid pointers by on-demand memory allocation. We develop a light-weight and practical forced execution technique. Without losing analysis precision, it avoids tracking individual instructions and on-demand allocation. Under our scheme, a forced execution is very similar to a native one. It features a novel memory pre-planning phase that pre-allocates a large memory buffer, and then initializes the buffer, and variables in the subject binary, with carefully crafted values in a random fashion before the real execution. The pre-planning is designed in such a way that dereferencing an invalid pointer has a very large chance to fall into the pre-allocated region and hence does not cause any exception, and semantically unrelated invalid pointer dereferences highly likely access disjoint (pre-allocated) memory regions, avoiding state corruptions with probabilistic guarantees. Our experiments show that our technique is 84 times faster than X-Force, has 6.5X and 10% fewer false positives and negatives for program dependence detection, respectively, and can expose 98% more malicious behaviors in 400 recent malware samples.
恶意软件是一个突出的安全威胁,暴露恶意软件的行为是一个关键的挑战。最近的恶意软件通常具有仅在满足某些条件时才释放的有效载荷。因此,通过简单地执行恶意软件很难完全披露有效载荷。此外,恶意软件样本可能配备了伪装技术,如VM检测器,一旦检测到恶意软件被监视,就会停止执行。强制执行是一种非常有效的方法,通过强制设置某些分支结果来渗透恶意软件的自我保护并暴露隐藏的行为。但是,现有的最先进的强制执行技术X-Force非常重量级,它需要跟踪单个指令,动态地推断指针别名关系,并通过按需内存分配修复无效指针。我们开发了一种轻便实用的强制执行技术。在不损失分析精度的情况下,它避免了跟踪单个指令和按需分配。在我们的方案下,强制执行与本地执行非常相似。它的特点是一个新颖的内存预规划阶段,预先分配一个大的内存缓冲区,然后初始化缓冲区和主题二进制中的变量,在实际执行之前以随机的方式精心制作值。预先规划是这样设计的:对无效指针的解引用很有可能落入预分配的区域,因此不会导致任何异常,而语义不相关的无效指针的解引用很可能访问不相交的(预分配的)内存区域,从而通过概率保证避免状态损坏。我们的实验表明,我们的技术比X-Force快84倍,程序依赖检测的假阳性和阴性分别减少了6.5倍和10%,并且可以在400个最近的恶意软件样本中暴露98%的恶意行为。
{"title":"PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning","authors":"Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, C. Harmon, X. Zhang","doi":"10.1109/SP40000.2020.00035","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00035","url":null,"abstract":"Malware is a prominent security threat and exposing malware behavior is a critical challenge. Recent malware often has payload that is only released when certain conditions are satisfied. It is hence difficult to fully disclose the payload by simply executing the malware. In addition, malware samples may be equipped with cloaking techniques such as VM detectors that stop execution once detecting that the malware is being monitored. Forced execution is a highly effective method to penetrate malware self-protection and expose hidden behavior, by forcefully setting certain branch outcomes. However, an existing state-of-the-art forced execution technique X-Force is very heavyweight, requiring tracing individual instructions, reasoning about pointer alias relations on-the-fly, and repairing invalid pointers by on-demand memory allocation. We develop a light-weight and practical forced execution technique. Without losing analysis precision, it avoids tracking individual instructions and on-demand allocation. Under our scheme, a forced execution is very similar to a native one. It features a novel memory pre-planning phase that pre-allocates a large memory buffer, and then initializes the buffer, and variables in the subject binary, with carefully crafted values in a random fashion before the real execution. The pre-planning is designed in such a way that dereferencing an invalid pointer has a very large chance to fall into the pre-allocated region and hence does not cause any exception, and semantically unrelated invalid pointer dereferences highly likely access disjoint (pre-allocated) memory regions, avoiding state corruptions with probabilistic guarantees. Our experiments show that our technique is 84 times faster than X-Force, has 6.5X and 10% fewer false positives and negatives for program dependence detection, respectively, and can expose 98% more malicious behaviors in 400 recent malware samples.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"25 1","pages":"1121-1138"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78245346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue 路径无关堆:最优实用的无关优先队列
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00037
E. Shi
We propose Path Oblivious Heap, an extremely simple, practical, and optimal oblivious priority queue. Our construction also implies a practical and optimal oblivious sorting algorithm which we call Path Oblivious Sort. Not only are our algorithms asymptotically optimal, we show that their practical performance is only a small constant factor worse than insecure baselines. More specificially, assuming roughly logarithmic client private storage, Path Oblivious Heap consumes 2× to 7× more bandwidth than the ordinary insecure binary heap; and Path Oblivious Sort consumes 4.5× to 6× more bandwidth than the insecure Merge Sort. We show that these performance results improve existing works by 1-2 orders of magnitude. Finally, we evaluate our algorithm for a multi-party computation scenario and show 7x to 8x reduction in the number of symmetric encryptions relative to the state of the art1.
我们提出路径无关堆,一个非常简单,实用,最优的无关优先队列。我们的构造还暗示了一种实用的、最优的遗忘排序算法,我们称之为路径遗忘排序。我们的算法不仅是渐近最优的,而且我们表明它们的实际性能只比不安全基线差一个小的常数因子。更具体地说,假设客户端私有存储大致为对数,路径无关堆消耗的带宽比普通的不安全二进制堆多2到7倍;路径无关排序比不安全的归并排序多消耗4.5 ~ 6倍的带宽。我们表明,这些性能结果提高了现有作品的1-2个数量级。最后,我们针对多方计算场景评估了我们的算法,并显示相对于艺术状态,对称加密的数量减少了7到8倍。
{"title":"Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue","authors":"E. Shi","doi":"10.1109/SP40000.2020.00037","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00037","url":null,"abstract":"We propose Path Oblivious Heap, an extremely simple, practical, and optimal oblivious priority queue. Our construction also implies a practical and optimal oblivious sorting algorithm which we call Path Oblivious Sort. Not only are our algorithms asymptotically optimal, we show that their practical performance is only a small constant factor worse than insecure baselines. More specificially, assuming roughly logarithmic client private storage, Path Oblivious Heap consumes 2× to 7× more bandwidth than the ordinary insecure binary heap; and Path Oblivious Sort consumes 4.5× to 6× more bandwidth than the insecure Merge Sort. We show that these performance results improve existing works by 1-2 orders of magnitude. Finally, we evaluate our algorithm for a multi-party computation scenario and show 7x to 8x reduction in the number of symmetric encryptions relative to the state of the art1.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"304 1","pages":"842-858"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73750674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware 在嵌入式固件中检测不安全的多二进制交互
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00036
Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, C. Kruegel, G. Vigna
Low-power, single-purpose embedded devices (e.g., routers and IoT devices) have become ubiquitous. While they automate and simplify many aspects of users’ lives, recent large-scale attacks have shown that their sheer number poses a severe threat to the Internet infrastructure. Unfortunately, the software on these systems is hardware-dependent, and typically executes in unique, minimal environments with non-standard configurations, making security analysis particularly challenging. Many of the existing devices implement their functionality through the use of multiple binaries. This multi-binary service implementation renders current static and dynamic analysis techniques either ineffective or inefficient, as they are unable to identify and adequately model the communication between the various executables. In this paper, we present Karonte, a static analysis approach capable of analyzing embedded-device firmware by modeling and tracking multi-binary interactions. Our approach propagates taint information between binaries to detect insecure interactions and identify vulnerabilities. We first evaluated Karonte on 53 firmware samples from various vendors, showing that our prototype tool can successfully track and constrain multi-binary interactions. This led to the discovery of 46 zero-day bugs. Then, we performed a large-scale experiment on 899 different samples, showing that Karonte scales well with firmware samples of different size and complexity.
低功耗、单一用途的嵌入式设备(如路由器和物联网设备)已经无处不在。虽然它们自动化并简化了用户生活的许多方面,但最近的大规模攻击表明,它们的数量之多对互联网基础设施构成了严重威胁。不幸的是,这些系统上的软件依赖于硬件,并且通常在具有非标准配置的独特最小环境中执行,这使得安全性分析特别具有挑战性。许多现有设备通过使用多个二进制文件来实现其功能。这种多二进制服务实现使得当前的静态和动态分析技术要么无效,要么效率低下,因为它们无法识别和充分建模各种可执行文件之间的通信。在本文中,我们提出了Karonte,一种能够通过建模和跟踪多二进制交互来分析嵌入式设备固件的静态分析方法。我们的方法在二进制文件之间传播污染信息,以检测不安全的交互并识别漏洞。我们首先在来自不同供应商的53个固件样本上对Karonte进行了评估,结果表明我们的原型工具可以成功地跟踪和约束多二进制交互。这导致发现了46个零日漏洞。然后,我们在899个不同的样本上进行了大规模实验,结果表明Karonte可以很好地适应不同大小和复杂程度的固件样本。
{"title":"Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware","authors":"Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, C. Kruegel, G. Vigna","doi":"10.1109/SP40000.2020.00036","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00036","url":null,"abstract":"Low-power, single-purpose embedded devices (e.g., routers and IoT devices) have become ubiquitous. While they automate and simplify many aspects of users’ lives, recent large-scale attacks have shown that their sheer number poses a severe threat to the Internet infrastructure. Unfortunately, the software on these systems is hardware-dependent, and typically executes in unique, minimal environments with non-standard configurations, making security analysis particularly challenging. Many of the existing devices implement their functionality through the use of multiple binaries. This multi-binary service implementation renders current static and dynamic analysis techniques either ineffective or inefficient, as they are unable to identify and adequately model the communication between the various executables. In this paper, we present Karonte, a static analysis approach capable of analyzing embedded-device firmware by modeling and tracking multi-binary interactions. Our approach propagates taint information between binaries to detect insecure interactions and identify vulnerabilities. We first evaluated Karonte on 53 firmware samples from various vendors, showing that our prototype tool can successfully track and constrain multi-binary interactions. This led to the discovery of 46 zero-day bugs. Then, we performed a large-scale experiment on 899 different samples, showing that Karonte scales well with firmware samples of different size and complexity.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"191 1","pages":"1544-1561"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79772039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Do Cookie Banners Respect my Choice? : Measuring Legal Compliance of Banners from IAB Europe’s Transparency and Consent Framework Cookie横幅是否尊重我的选择?:衡量IAB欧洲透明度和同意框架横幅的法律合规性
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00076
Célestin Matte, Nataliia Bielova, C. Santos
As a result of the GDPR and the ePrivacy Directive, European users encounter cookie banners on almost every website. Many of such banners are implemented by Consent Management Providers (CMPs), who respect IAB Europe’s Transparency and Consent Framework (TCF). Via cookie banners, CMPs collect and disseminate user consent to third parties. In this work, we systematically study IAB Europe’s TCF and analyze consent stored behind the user interface of TCF cookie banners. We analyze the GDPR and the ePrivacy Directive to identify potential legal violations in implementations of cookie banners based on the storage of consent and detect such suspected violations by crawling 1 426 websites that contains TCF banners, found among 28 257 crawled European websites. With two automatic and semi-automatic crawl campaigns, we detect suspected violations, and we find that: 141 websites register positive consent even if the user has not made their choice; 236 websites nudge the users towards accepting consent by pre-selecting options; and 27 websites store a positive consent even if the user has explicitly opted out. Performing extensive tests on 560 websites, we find at least one suspected violation in 54% of them. Finally, we provide a browser extension to facilitate manual detection of suspected violations for regular users and Data Protection Authorities.
由于GDPR和电子隐私指令,欧洲用户几乎在每个网站上都会遇到cookie横幅。许多这样的横幅是由同意管理提供商(cmp)实施的,他们尊重IAB欧洲的透明度和同意框架(TCF)。通过cookie横幅,cmp收集并向第三方传播用户同意。在这项工作中,我们系统地研究了IAB欧洲的TCF,并分析了存储在TCF cookie横幅用户界面背后的同意。我们分析了GDPR和电子隐私指令,以识别基于同意存储的cookie横幅实施中的潜在违法行为,并通过在28 257个抓取的欧洲网站中发现包含TCF横幅的1426个网站来检测此类可疑违规行为。通过两次自动和半自动抓取活动,我们发现了可疑的违规行为,我们发现:141个网站注册了积极的同意,即使用户没有做出选择;236个网站通过预先选择选项来推动用户接受同意;还有27家网站存储了用户的积极同意,即使用户已经明确选择退出。我们对560个网站进行了广泛的测试,发现54%的网站至少有一项违规行为。最后,我们提供了一个浏览器扩展,以方便常规用户和数据保护机构手动检测可疑违规行为。
{"title":"Do Cookie Banners Respect my Choice? : Measuring Legal Compliance of Banners from IAB Europe’s Transparency and Consent Framework","authors":"Célestin Matte, Nataliia Bielova, C. Santos","doi":"10.1109/SP40000.2020.00076","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00076","url":null,"abstract":"As a result of the GDPR and the ePrivacy Directive, European users encounter cookie banners on almost every website. Many of such banners are implemented by Consent Management Providers (CMPs), who respect IAB Europe’s Transparency and Consent Framework (TCF). Via cookie banners, CMPs collect and disseminate user consent to third parties. In this work, we systematically study IAB Europe’s TCF and analyze consent stored behind the user interface of TCF cookie banners. We analyze the GDPR and the ePrivacy Directive to identify potential legal violations in implementations of cookie banners based on the storage of consent and detect such suspected violations by crawling 1 426 websites that contains TCF banners, found among 28 257 crawled European websites. With two automatic and semi-automatic crawl campaigns, we detect suspected violations, and we find that: 141 websites register positive consent even if the user has not made their choice; 236 websites nudge the users towards accepting consent by pre-selecting options; and 27 websites store a positive consent even if the user has explicitly opted out. Performing extensive tests on 560 websites, we find at least one suspected violation in 54% of them. Finally, we provide a browser extension to facilitate manual detection of suspected violations for regular users and Data Protection Authorities.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"4 1","pages":"791-809"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85209853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection 通过微架构负载值注入劫持瞬态执行
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00089
Jo Van Bulck, D. Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Y. Yarom, B. Sunar, D. Gruss, F. Piessens
The recent Spectre attack first showed how to inject incorrect branch targets into a victim domain by poisoning microarchitectural branch prediction history. In this paper, we generalize injection-based methodologies to the memory hierarchy by directly injecting incorrect, attacker-controlled values into a victim’s transient execution. We propose Load Value Injection (LVI) as an innovative technique to reversely exploit Meltdown-type microarchitectural data leakage. LVI abuses that faulting or assisted loads, executed by a legitimate victim program, may transiently use dummy values or poisoned data from various microarchitectural buffers, before eventually being re-issued by the processor. We show how LVI gadgets allow to expose victim secrets and hijack transient control flow. We practically demonstrate LVI in several proof-of-concept attacks against Intel SGX enclaves, and we discuss implications for traditional user process and kernel isolation. State-of-the-art Meltdown and Spectre defenses, including widespread silicon-level and microcode mitigations, are orthogonal to our novel LVI techniques. LVI drastically widens the spectrum of incorrect transient paths. Fully mitigating our attacks requires serializing the processor pipeline with lfence instructions after possibly every memory load. Additionally and even worse, due to implicit loads, certain instructions have to be blacklisted, including the ubiquitous x86 ret instruction. Intel plans compiler and assembler-based full mitigations that will allow at least SGX enclave programs to remain secure on LVI-vulnerable systems. Depending on the application and optimization strategy, we observe extensive overheads of factor 2 to 19 for prototype implementations of the full mitigation.
最近的Spectre攻击首次展示了如何通过毒害微架构分支预测历史将错误的分支目标注入受害者域。在本文中,我们通过将不正确的、攻击者控制的值直接注入受害者的瞬态执行,将基于注入的方法推广到内存层次。我们提出负载值注入(Load Value Injection, LVI)作为一种创新技术来反向利用熔毁型微架构数据泄漏。LVI滥用了由合法受害者程序执行的错误或辅助负载在最终由处理器重新发出之前,可能会暂时使用来自各种微体系结构缓冲区的虚拟值或中毒数据。我们展示了LVI小工具如何允许暴露受害者的秘密和劫持瞬态控制流。我们在针对Intel SGX飞地的几个概念验证攻击中实际演示了LVI,并讨论了对传统用户进程和内核隔离的影响。最先进的熔解和幽灵防御,包括广泛的硅级和微码缓解,与我们的新型LVI技术正交。LVI极大地拓宽了不正确瞬态路径的频谱。完全减轻我们的攻击需要在每次内存加载之后用lfence指令序列化处理器管道。此外,更糟糕的是,由于隐式加载,某些指令必须被列入黑名单,包括无处不在的x86 ret指令。英特尔计划基于编译器和汇编器的全面缓解措施,至少允许SGX飞地程序在易受lvi攻击的系统上保持安全。根据应用程序和优化策略的不同,我们观察到完整缓解的原型实现的开销为2到19倍。
{"title":"LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection","authors":"Jo Van Bulck, D. Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Y. Yarom, B. Sunar, D. Gruss, F. Piessens","doi":"10.1109/SP40000.2020.00089","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00089","url":null,"abstract":"The recent Spectre attack first showed how to inject incorrect branch targets into a victim domain by poisoning microarchitectural branch prediction history. In this paper, we generalize injection-based methodologies to the memory hierarchy by directly injecting incorrect, attacker-controlled values into a victim’s transient execution. We propose Load Value Injection (LVI) as an innovative technique to reversely exploit Meltdown-type microarchitectural data leakage. LVI abuses that faulting or assisted loads, executed by a legitimate victim program, may transiently use dummy values or poisoned data from various microarchitectural buffers, before eventually being re-issued by the processor. We show how LVI gadgets allow to expose victim secrets and hijack transient control flow. We practically demonstrate LVI in several proof-of-concept attacks against Intel SGX enclaves, and we discuss implications for traditional user process and kernel isolation. State-of-the-art Meltdown and Spectre defenses, including widespread silicon-level and microcode mitigations, are orthogonal to our novel LVI techniques. LVI drastically widens the spectrum of incorrect transient paths. Fully mitigating our attacks requires serializing the processor pipeline with lfence instructions after possibly every memory load. Additionally and even worse, due to implicit loads, certain instructions have to be blacklisted, including the ubiquitous x86 ret instruction. Intel plans compiler and assembler-based full mitigations that will allow at least SGX enclave programs to remain secure on LVI-vulnerable systems. Depending on the application and optimization strategy, we observe extensive overheads of factor 2 to 19 for prototype implementations of the full mitigation.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"81 1","pages":"54-72"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82855953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 181
Privacy Risks of General-Purpose Language Models 通用语言模型的隐私风险
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00095
Xudong Pan, Mi Zhang, S. Ji, Min Yang
Recently, a new paradigm of building general-purpose language models (e.g., Google’s Bert and OpenAI’s GPT-2) in Natural Language Processing (NLP) for text feature extraction, a standard procedure in NLP systems that converts texts to vectors (i.e., embeddings) for downstream modeling, has arisen and starts to find its application in various downstream NLP tasks and real world systems (e.g., Google’s search engine [6]). To obtain general-purpose text embeddings, these language models have highly complicated architectures with millions of learnable parameters and are usually pretrained on billions of sentences before being utilized. As is widely recognized, such a practice indeed improves the state-of-the-art performance of many downstream NLP tasks. However, the improved utility is not for free. We find the text embeddings from general-purpose language models would capture much sensitive information from the plain text. Once being accessed by the adversary, the embeddings can be reverse-engineered to disclose sensitive information of the victims for further harassment. Although such a privacy risk can impose a real threat to the future leverage of these promising NLP tools, there are neither published attacks nor systematic evaluations by far for the mainstream industry-level language models. To bridge this gap, we present the first systematic study on the privacy risks of 8 state-of-the-art language models with 4 diverse case studies. By constructing 2 novel attack classes, our study demonstrates the aforementioned privacy risks do exist and can impose practical threats to the application of general-purpose language models on sensitive data covering identity, genome, healthcare and location. For example, we show the adversary with nearly no prior knowledge can achieve about 75% accuracy when inferring the precise disease site from Bert embeddings of patients’ medical descriptions. As possible countermeasures, we propose 4 different defenses (via rounding, differential privacy, adversarial training and subspace projection) to obfuscate the unprotected embeddings for mitigation purpose. With extensive evaluations, we also provide a preliminary analysis on the utility-privacy trade-off brought by each defense, which we hope may foster future mitigation researches.
最近,在自然语言处理(NLP)中用于文本特征提取的构建通用语言模型的新范式(例如Google的Bert和OpenAI的GPT-2)已经出现,并开始在各种下游NLP任务和现实世界系统(例如Google的搜索引擎[6])中找到其应用。文本特征提取是NLP系统中将文本转换为向量(即嵌入)进行下游建模的标准程序。为了获得通用的文本嵌入,这些语言模型具有高度复杂的体系结构,具有数百万个可学习的参数,并且在使用之前通常需要对数十亿个句子进行预训练。众所周知,这样的实践确实提高了许多下游NLP任务的最先进性能。然而,改进的实用程序并不是免费的。我们发现,通用语言模型的文本嵌入可以从纯文本中捕获许多敏感信息。一旦被攻击者访问,就可以对嵌入进行反向工程,以泄露受害者的敏感信息,以便进一步骚扰。尽管这样的隐私风险可能会对这些有前途的NLP工具的未来杠杆作用造成真正的威胁,但到目前为止,主流行业级语言模型既没有公开的攻击,也没有系统的评估。为了弥补这一差距,我们首次对8种最先进的语言模型的隐私风险进行了系统研究,并进行了4个不同的案例研究。通过构建两个新的攻击类,我们的研究证明了上述隐私风险确实存在,并且可以对通用语言模型在敏感数据(包括身份、基因组、医疗保健和位置)上的应用施加实际威胁。例如,我们展示了几乎没有先验知识的对手在从患者医学描述的Bert嵌入推断精确的疾病位置时可以达到约75%的准确率。作为可能的对策,我们提出了4种不同的防御(通过舍入、差分隐私、对抗性训练和子空间投影)来混淆未受保护的嵌入,以达到缓解目的。通过广泛的评估,我们还对每种防御带来的效用-隐私权衡进行了初步分析,我们希望这可以促进未来的缓解研究。
{"title":"Privacy Risks of General-Purpose Language Models","authors":"Xudong Pan, Mi Zhang, S. Ji, Min Yang","doi":"10.1109/SP40000.2020.00095","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00095","url":null,"abstract":"Recently, a new paradigm of building general-purpose language models (e.g., Google’s Bert and OpenAI’s GPT-2) in Natural Language Processing (NLP) for text feature extraction, a standard procedure in NLP systems that converts texts to vectors (i.e., embeddings) for downstream modeling, has arisen and starts to find its application in various downstream NLP tasks and real world systems (e.g., Google’s search engine [6]). To obtain general-purpose text embeddings, these language models have highly complicated architectures with millions of learnable parameters and are usually pretrained on billions of sentences before being utilized. As is widely recognized, such a practice indeed improves the state-of-the-art performance of many downstream NLP tasks. However, the improved utility is not for free. We find the text embeddings from general-purpose language models would capture much sensitive information from the plain text. Once being accessed by the adversary, the embeddings can be reverse-engineered to disclose sensitive information of the victims for further harassment. Although such a privacy risk can impose a real threat to the future leverage of these promising NLP tools, there are neither published attacks nor systematic evaluations by far for the mainstream industry-level language models. To bridge this gap, we present the first systematic study on the privacy risks of 8 state-of-the-art language models with 4 diverse case studies. By constructing 2 novel attack classes, our study demonstrates the aforementioned privacy risks do exist and can impose practical threats to the application of general-purpose language models on sensitive data covering identity, genome, healthcare and location. For example, we show the adversary with nearly no prior knowledge can achieve about 75% accuracy when inferring the precise disease site from Bert embeddings of patients’ medical descriptions. As possible countermeasures, we propose 4 different defenses (via rounding, differential privacy, adversarial training and subspace projection) to obfuscate the unprotected embeddings for mitigation purpose. With extensive evaluations, we also provide a preliminary analysis on the utility-privacy trade-off brought by each defense, which we hope may foster future mitigation researches.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"26 1","pages":"1314-1331"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91089337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks 利用EM侧信道信息检测回旋锤攻击
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00060
Zhenkai Zhang, Zihao Zhan, D. Balasubramanian, B. Li, P. Völgyesi, X. Koutsoukos
The rowhammer bug belongs to software-induced hardware faults, and has been exploited to form a wide range of powerful rowhammer attacks. Yet, how to effectively detect such attacks remains a challenging problem. In this paper, we propose a novel approach named RADAR (Rowhammer Attack Detection via A Radio) that leverages certain electromagnetic (EM) signals to detect rowhammer attacks. In particular, we have found that there are recognizable hammering-correlated sideband patterns in the spectrum of the DRAM clock signal. As such patterns are inevitable physical side effects of hammering the DRAM, they can "expose" any potential rowhammer attacks including the extremely elusive ones hidden inside encrypted and isolated environments like Intel SGX enclaves. However, the patterns of interest may become unapparent due to the common use of spread-spectrum clocking (SSC) in computer systems. We propose a de-spreading method that can reassemble the hammering-correlated sideband patterns scattered by SSC. Using a common classification technique, we can achieve both effective and robust detection-based defense against rowhammer attacks, as evaluated on a RADAR prototype under various scenarios. In addition, our RADAR does not impose any performance overhead on the protected system. There has been little prior work that uses physical side-channel information to perform rowhammer defenses, and to the best of our knowledge, this is the first investigation on leveraging EM side-channel information for this purpose.
该漏洞属于由软件引起的硬件故障,并已被广泛利用,形成了强大的回旋锤攻击。然而,如何有效地检测此类攻击仍然是一个具有挑战性的问题。在本文中,我们提出了一种名为RADAR (Rowhammer Attack Detection via a Radio)的新方法,该方法利用某些电磁(EM)信号来检测Rowhammer攻击。特别是,我们发现在DRAM时钟信号的频谱中存在可识别的锤击相关边带模式。由于这种模式是敲打DRAM的不可避免的物理副作用,它们可以“暴露”任何潜在的rowhammer攻击,包括隐藏在加密和隔离环境(如英特尔SGX飞地)中的极其难以捉摸的攻击。然而,由于在计算机系统中普遍使用扩频时钟(SSC),感兴趣的模式可能变得不明显。我们提出了一种去扩频的方法,可以重组被SSC散射的锤击相关边带模式。使用一种通用的分类技术,我们可以实现有效和稳健的基于检测的防御,以抵御滚锤攻击,正如在各种场景下的雷达原型上所评估的那样。此外,我们的RADAR不会对受保护系统施加任何性能开销。之前很少有研究使用物理侧信道信息来执行锤防御,据我们所知,这是第一次利用EM侧信道信息来实现这一目的。
{"title":"Leveraging EM Side-Channel Information to Detect Rowhammer Attacks","authors":"Zhenkai Zhang, Zihao Zhan, D. Balasubramanian, B. Li, P. Völgyesi, X. Koutsoukos","doi":"10.1109/SP40000.2020.00060","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00060","url":null,"abstract":"The rowhammer bug belongs to software-induced hardware faults, and has been exploited to form a wide range of powerful rowhammer attacks. Yet, how to effectively detect such attacks remains a challenging problem. In this paper, we propose a novel approach named RADAR (Rowhammer Attack Detection via A Radio) that leverages certain electromagnetic (EM) signals to detect rowhammer attacks. In particular, we have found that there are recognizable hammering-correlated sideband patterns in the spectrum of the DRAM clock signal. As such patterns are inevitable physical side effects of hammering the DRAM, they can \"expose\" any potential rowhammer attacks including the extremely elusive ones hidden inside encrypted and isolated environments like Intel SGX enclaves. However, the patterns of interest may become unapparent due to the common use of spread-spectrum clocking (SSC) in computer systems. We propose a de-spreading method that can reassemble the hammering-correlated sideband patterns scattered by SSC. Using a common classification technique, we can achieve both effective and robust detection-based defense against rowhammer attacks, as evaluated on a RADAR prototype under various scenarios. In addition, our RADAR does not impose any performance overhead on the protected system. There has been little prior work that uses physical side-channel information to perform rowhammer defenses, and to the best of our knowledge, this is the first investigation on leveraging EM side-channel information for this purpose.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"7 1","pages":"729-746"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91337360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2020 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1