首页 > 最新文献

2020 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication FIDO2是用户认证的弑君者吗?FIDO2无密码认证的可用性比较研究
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00047
Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, M. Backes, Sven Bugiel
The newest contender for succeeding passwords as the incumbent web authentication scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the W3C, FIDO2 has found support in virtually every browser, finds increasing support by service providers, and has adoptions beyond browser-software on its way. While it supports MFA and 2FA, its single-factor, passwordless authentication with security tokens has received the bulk of attention and was hailed by its supporters and the media as the solution that will replace text-passwords on the web. Despite its obvious security and deployability benefits—a setting that no prior solution had in this strong combination—the paradigm shift from a familiar knowledge factor to purely a possession factor raises questions about the acceptance of passwordless authentication by end-users.This paper presents the first large-scale lab study of FIDO2 single-factor authentication to collect insights about end-users’ perception, acceptance, and concerns about passwordless authentication. Through hands-on tasks our participants gather first-hand experience with passwordless authentication using a security key, which they afterwards reflect on in a survey. Our results show that users are willing to accept a direct replacement of text-based passwords with a security key for single-factor authentication. That is an encouraging result in the quest to replace passwords. But, our results also identify new concerns that can potentially hinder the widespread adoption of FIDO2 passwordless authentication. In order to mitigate these factors, we derive concrete recommendations to try to help in the ongoing proliferation of passwordless authentication on the web.
接替密码作为现有web认证方案的最新竞争者是FIDO2标准。FIDO2由FIDO联盟和W3C共同开发和支持,已经在几乎所有浏览器中得到了支持,得到了越来越多的服务提供商的支持,并且正在被浏览器软件以外的应用所采用。虽然它支持MFA和2FA,但其使用安全令牌的单因素无密码身份验证受到了大量关注,并被其支持者和媒体誉为将取代网络上的文本密码的解决方案。尽管它具有明显的安全性和可部署性优势(在这种强组合中没有先前的解决方案具有这种设置),但从熟悉的知识因素到纯粹的拥有因素的范式转变引发了最终用户接受无密码身份验证的问题。本文介绍了FIDO2单因素身份验证的首次大规模实验室研究,以收集有关最终用户对无密码身份验证的感知、接受和关注的见解。通过实践任务,我们的参与者收集了使用安全密钥的无密码认证的第一手经验,然后他们在调查中反思这些经验。我们的研究结果表明,用户愿意接受用单因素身份验证的安全密钥直接替换基于文本的密码。在寻求替代密码的过程中,这是一个令人鼓舞的结果。但是,我们的研究结果也发现了新的问题,这些问题可能会阻碍FIDO2无密码身份验证的广泛采用。为了减轻这些因素,我们提出了具体的建议,试图帮助在网络上不断扩散的无密码身份验证。
{"title":"Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication","authors":"Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, M. Backes, Sven Bugiel","doi":"10.1109/SP40000.2020.00047","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00047","url":null,"abstract":"The newest contender for succeeding passwords as the incumbent web authentication scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the W3C, FIDO2 has found support in virtually every browser, finds increasing support by service providers, and has adoptions beyond browser-software on its way. While it supports MFA and 2FA, its single-factor, passwordless authentication with security tokens has received the bulk of attention and was hailed by its supporters and the media as the solution that will replace text-passwords on the web. Despite its obvious security and deployability benefits—a setting that no prior solution had in this strong combination—the paradigm shift from a familiar knowledge factor to purely a possession factor raises questions about the acceptance of passwordless authentication by end-users.This paper presents the first large-scale lab study of FIDO2 single-factor authentication to collect insights about end-users’ perception, acceptance, and concerns about passwordless authentication. Through hands-on tasks our participants gather first-hand experience with passwordless authentication using a security key, which they afterwards reflect on in a survey. Our results show that users are willing to accept a direct replacement of text-based passwords with a security key for single-factor authentication. That is an encouraging result in the quest to replace passwords. But, our results also identify new concerns that can potentially hinder the widespread adoption of FIDO2 passwordless authentication. In order to mitigate these factors, we derive concrete recommendations to try to help in the ongoing proliferation of passwordless authentication on the web.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"28 1","pages":"268-285"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89277456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
SP 2020 Breaker Page SP 2020断路器页面
Pub Date : 2020-05-01 DOI: 10.1109/sp40000.2020.00101
{"title":"SP 2020 Breaker Page","authors":"","doi":"10.1109/sp40000.2020.00101","DOIUrl":"https://doi.org/10.1109/sp40000.2020.00101","url":null,"abstract":"","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88314666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SP 2020 TOC
Pub Date : 2020-05-01 DOI: 10.1109/sp40000.2020.00102
Eunyong Cheon, Sanam Ghorbani Lyastani, Michaela Neumayr
NetCAT: Practical Cache Attacks from the Network 20 Michael Kurth (Vrije Universiteit Amsterdam, The Netherlands ; ETH Zurich, Switzerland), Ben Gras (Vrije Universiteit Amsterdam, The Netherlands), Dennis Andriesse (Vrije Universiteit Amsterdam, The Netherlands), Cristiano Giuffrida (Vrije Universiteit Amsterdam, The Netherlands), Herbert Bos (Vrije Universiteit Amsterdam, The Netherlands), and Kaveh Razavi (Vrije Universiteit Amsterdam, The Netherlands)
NetCAT:网络20 Michael Kurth的实用缓存攻击(荷兰阿姆斯特丹自由大学;苏黎世联邦理工学院)、Ben Gras(阿姆斯特丹自由大学,荷兰)、Dennis Andriesse(阿姆斯特丹自由大学,荷兰)、Cristiano Giuffrida(阿姆斯特丹自由大学,荷兰)、Herbert Bos(阿姆斯特丹自由大学,荷兰)和Kaveh Razavi(阿姆斯特丹自由大学,荷兰)
{"title":"SP 2020 TOC","authors":"Eunyong Cheon, Sanam Ghorbani Lyastani, Michaela Neumayr","doi":"10.1109/sp40000.2020.00102","DOIUrl":"https://doi.org/10.1109/sp40000.2020.00102","url":null,"abstract":"NetCAT: Practical Cache Attacks from the Network 20 Michael Kurth (Vrije Universiteit Amsterdam, The Netherlands ; ETH Zurich, Switzerland), Ben Gras (Vrije Universiteit Amsterdam, The Netherlands), Dennis Andriesse (Vrije Universiteit Amsterdam, The Netherlands), Cristiano Giuffrida (Vrije Universiteit Amsterdam, The Netherlands), Herbert Bos (Vrije Universiteit Amsterdam, The Netherlands), and Kaveh Razavi (Vrije Universiteit Amsterdam, The Netherlands)","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89776483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SP 2020 Index 标准普尔2020指数
Pub Date : 2020-05-01 DOI: 10.1109/sp40000.2020.00112
{"title":"SP 2020 Index","authors":"","doi":"10.1109/sp40000.2020.00112","DOIUrl":"https://doi.org/10.1109/sp40000.2020.00112","url":null,"abstract":"","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"99 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83327401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tactical Provenance Analysis for Endpoint Detection and Response Systems 端点检测和响应系统的战术来源分析
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00096
Wajih Ul Hassan, Adam Bates, Daniel Marino
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions by matching system events against known adversarial behaviors. However, current solutions suffer from three challenges: 1) EDR tools generate a high volume of false alarms, creating backlogs of investigation tasks for analysts; 2) determining the veracity of these threat alerts requires tedious manual labor due to the overwhelming amount of low-level system logs, creating a "needle-in-a-haystack" problem; and 3) due to the tremendous resource burden of log retention, in practice the system logs describing long-lived attack campaigns are often deleted before an investigation is ever initiated.This paper describes an effort to bring the benefits of data provenance to commercial EDR tools. We introduce the notion of Tactical Provenance Graphs (TPGs) that, rather than encoding low-level system event dependencies, reason about causal dependencies between EDR-generated threat alerts. TPGs provide compact visualization of multi-stage attacks to analysts, accelerating investigation. To address EDR’s false alarm problem, we introduce a threat scoring methodology that assesses risk based on the temporal ordering between individual threat alerts present in the TPG. In contrast to the retention of unwieldy system logs, we maintain a minimally-sufficient skeleton graph that can provide linkability between existing and future threat alerts. We evaluate our system, RapSheet, using the Symantec EDR tool in an enterprise environment. Results show that our approach can rank truly malicious TPGs higher than false alarm TPGs. Moreover, our skeleton graph reduces the long-term burden of log retention by up to 87%.
端点检测和响应(EDR)工具通过将系统事件与已知的敌对行为相匹配,提供对复杂入侵的可见性。然而,目前的解决方案面临着三个挑战:1)EDR工具产生大量的假警报,为分析师创造了积压的调查任务;2)确定这些威胁警报的准确性需要繁琐的手工劳动,因为大量的低级系统日志,造成了“大海捞针”的问题;3)由于日志保留的巨大资源负担,在实践中,描述长期攻击活动的系统日志通常在调查开始之前被删除。本文描述了将数据来源的好处引入商业EDR工具的努力。我们引入了战术起源图(TPGs)的概念,它不是编码低级系统事件依赖关系,而是推理edr生成的威胁警报之间的因果依赖关系。TPGs为分析人员提供了紧凑的多阶段攻击可视化,加速了调查。为了解决EDR的假警报问题,我们引入了一种威胁评分方法,该方法基于TPG中存在的单个威胁警报之间的时间顺序来评估风险。与保留笨拙的系统日志相比,我们维护了一个最小限度的骨架图,可以提供现有和未来威胁警报之间的链接性。我们在企业环境中使用赛门铁克EDR工具评估我们的系统RapSheet。结果表明,我们的方法可以将真正恶意的TPGs排在假警报TPGs之前。此外,我们的骨架图将日志保留的长期负担减少了87%。
{"title":"Tactical Provenance Analysis for Endpoint Detection and Response Systems","authors":"Wajih Ul Hassan, Adam Bates, Daniel Marino","doi":"10.1109/SP40000.2020.00096","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00096","url":null,"abstract":"Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions by matching system events against known adversarial behaviors. However, current solutions suffer from three challenges: 1) EDR tools generate a high volume of false alarms, creating backlogs of investigation tasks for analysts; 2) determining the veracity of these threat alerts requires tedious manual labor due to the overwhelming amount of low-level system logs, creating a \"needle-in-a-haystack\" problem; and 3) due to the tremendous resource burden of log retention, in practice the system logs describing long-lived attack campaigns are often deleted before an investigation is ever initiated.This paper describes an effort to bring the benefits of data provenance to commercial EDR tools. We introduce the notion of Tactical Provenance Graphs (TPGs) that, rather than encoding low-level system event dependencies, reason about causal dependencies between EDR-generated threat alerts. TPGs provide compact visualization of multi-stage attacks to analysts, accelerating investigation. To address EDR’s false alarm problem, we introduce a threat scoring methodology that assesses risk based on the temporal ordering between individual threat alerts present in the TPG. In contrast to the retention of unwieldy system logs, we maintain a minimally-sufficient skeleton graph that can provide linkability between existing and future threat alerts. We evaluate our system, RapSheet, using the Symantec EDR tool in an enterprise environment. Results show that our approach can rank truly malicious TPGs higher than false alarm TPGs. Moreover, our skeleton graph reduces the long-term burden of log retention by up to 87%.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"49 1","pages":"1172-1189"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76471584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories SPIDER:在相关软件库中启用快速补丁传播
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00038
Aravind Machiry, Nilo Redini, E. Camellini, C. Kruegel, G. Vigna
Despite the effort of software maintainers, patches to open-source repositories are propagated from the main codebase to all the related projects (e.g., forks) with a significant delay. Previous work shows that this is true also for security patches, which represents a critical problem. Vulnerability databases, such as the CVE database, were born to speed-up the application of critical patches; however, patches associated with CVE entries (i.e., CVE patches) are still applied with a delay, and some security fixes lack the corresponding CVE entries. Because of this, project maintainers could miss security patches when upgrading software.In this paper, we are the first to define safe patches (sps). An sp is a patch that does not disrupt the intended functionality of the program (on valid inputs), meaning that it can be applied with no testing; we argue that most security fixes fall into this category. Furthermore, we show a technique to identify sps, and implement SPIDER 1, a tool based on such a technique that works by analyzing the source code of the original and patched versions of a file. We performed a large-scale evaluation on 341,767 patches from 32 large and popular source code repositories as well as on 809 CVE patches. Results show that SPIDER was able to identify 67,408 sps and that most of the CVE patches are sps. In addition, SPIDER identified 2,278 patches that fix vulnerabilities lacking a CVE; 229 of these are still unpatched in different vendor kernels, which can be considered as potential unfixed vulnerabilities.
尽管软件维护者付出了很大的努力,开源存储库的补丁还是会从主代码库传播到所有相关的项目(例如,分支)。以前的工作表明,安全补丁也是如此,这代表了一个关键问题。漏洞数据库(如CVE数据库)的诞生是为了加速关键补丁的应用;但是,与CVE表项关联的补丁(即CVE补丁)仍然会延迟应用,并且某些安全补丁缺少相应的CVE表项。因此,项目维护人员在升级软件时可能会错过安全补丁。在本文中,我们首次定义了安全补丁(sps)。sp是一个补丁,它不会破坏程序的预期功能(在有效输入上),这意味着它可以在没有测试的情况下应用;我们认为大多数安全修复程序都属于这一类。此外,我们还展示了一种识别sps的技术,并实现了SPIDER 1,这是一种基于这种技术的工具,通过分析文件的原始版本和修补版本的源代码来工作。我们对来自32个大型流行源代码库的341,767个补丁以及809个CVE补丁进行了大规模评估。结果表明,SPIDER能够识别67,408个sps,大多数CVE补丁都是sps。此外,SPIDER还发现了2278个补丁,修复了缺乏CVE的漏洞;其中229个在不同供应商的内核中仍未打补丁,可以将其视为潜在的未修复漏洞。
{"title":"SPIDER: Enabling Fast Patch Propagation In Related Software Repositories","authors":"Aravind Machiry, Nilo Redini, E. Camellini, C. Kruegel, G. Vigna","doi":"10.1109/SP40000.2020.00038","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00038","url":null,"abstract":"Despite the effort of software maintainers, patches to open-source repositories are propagated from the main codebase to all the related projects (e.g., forks) with a significant delay. Previous work shows that this is true also for security patches, which represents a critical problem. Vulnerability databases, such as the CVE database, were born to speed-up the application of critical patches; however, patches associated with CVE entries (i.e., CVE patches) are still applied with a delay, and some security fixes lack the corresponding CVE entries. Because of this, project maintainers could miss security patches when upgrading software.In this paper, we are the first to define safe patches (sps). An sp is a patch that does not disrupt the intended functionality of the program (on valid inputs), meaning that it can be applied with no testing; we argue that most security fixes fall into this category. Furthermore, we show a technique to identify sps, and implement SPIDER 1, a tool based on such a technique that works by analyzing the source code of the original and patched versions of a file. We performed a large-scale evaluation on 341,767 patches from 32 large and popular source code repositories as well as on 809 CVE patches. Results show that SPIDER was able to identify 67,408 sps and that most of the CVE patches are sps. In addition, SPIDER identified 2,278 patches that fix vulnerabilities lacking a CVE; 229 of these are still unpatched in different vendor kernels, which can be considered as potential unfixed vulnerabilities.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"7 1","pages":"1562-1579"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76170818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans ICAS:一个可扩展的框架,用于估计IC布局对加性木马的易感性
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00083
Timothy Trippel, K. Shin, K. Bush, Matthew Hicks
The transistors used to construct Integrated Circuits (ICs) continue to shrink. While this shrinkage improves performance and density, it also reduces trust: the price to build leading-edge fabrication facilities has skyrocketed, forcing even nation states to outsource the fabrication of high-performance ICs. Outsourcing fabrication presents a security threat because the black-box nature of a fabricated IC makes comprehensive inspection infeasible. Since prior work shows the feasibility of fabrication-time attackers’ evasion of existing post-fabrication defenses, IC designers must be able to protect their physical designs before handing them off to an untrusted foundry. To this end, recent work suggests methods to harden IC layouts against attack. Unfortunately, no tool exists to assess the effectiveness of the proposed defenses, thus leaving defensive gaps.This paper presents an extensible IC layout security analysis tool called IC Attack Surface (ICAS) that quantifies defensive coverage. For researchers, ICAS identifies gaps for future defenses to target, and enables the quantitative comparison of existing and future defenses. For practitioners, ICAS enables the exploration of the impact of design decisions on an IC’s resilience to fabrication-time attack. ICAS takes a set of metrics that encode the challenge of inserting a hardware Trojan into an IC layout, a set of attacks that the defender cares about, and a completed IC layout and reports the number of ways an attacker can add each attack to the design. While the ideal score is zero, practically, we find that lower scores correlate with increased attacker effort.To demonstrate ICAS’ ability to reveal defensive gaps, we analyze over 60 layouts of three real-world hardware designs (a processor, AES and DSP accelerators), protected with existing defenses. We evaluate the effectiveness of each circuit–defense combination against three representative attacks from the literature. Results show that some defenses are ineffective and others, while effective at reducing the attack surface, leave 10’s to 1000’s of unique attack implementations that an attacker can exploit.
用于构建集成电路(ic)的晶体管继续缩小。虽然这种收缩提高了性能和密度,但也降低了信任度:建造尖端制造设施的价格飙升,甚至迫使国家将高性能集成电路的制造外包。外包制造带来了安全威胁,因为制造集成电路的黑箱性质使得全面检查不可行。由于先前的工作表明制造时攻击者逃避现有制造后防御的可行性,因此IC设计师必须能够在将其交给不受信任的代工厂之前保护其物理设计。为此,最近的工作提出了加强IC布局抵御攻击的方法。不幸的是,没有工具来评估所建议的防御的有效性,因此留下了防御空白。本文提出了一种可扩展的集成电路布局安全分析工具——集成电路攻击面(ICAS),用于量化防御覆盖范围。对于研究人员来说,ICAS确定了未来防御目标的差距,并能够对现有和未来防御进行定量比较。对于从业者来说,ICAS可以探索设计决策对集成电路抗制造时间攻击的弹性的影响。ICAS采用一组指标,这些指标对将硬件木马插入IC布局的挑战、防御者关心的一组攻击和完整的IC布局进行编码,并报告攻击者可以将每种攻击添加到设计中的方法的数量。虽然理想的分数是零,但实际上,我们发现较低的分数与攻击者的努力增加有关。为了展示ICAS揭示防御漏洞的能力,我们分析了三种现实世界硬件设计(处理器,AES和DSP加速器)的60多种布局,并受到现有防御措施的保护。我们从文献中评估了每种电路防御组合对三种代表性攻击的有效性。结果表明,一些防御是无效的,而另一些防御虽然有效地减少了攻击面,但却留下了10到1000个独特的攻击实现,供攻击者利用。
{"title":"ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans","authors":"Timothy Trippel, K. Shin, K. Bush, Matthew Hicks","doi":"10.1109/SP40000.2020.00083","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00083","url":null,"abstract":"The transistors used to construct Integrated Circuits (ICs) continue to shrink. While this shrinkage improves performance and density, it also reduces trust: the price to build leading-edge fabrication facilities has skyrocketed, forcing even nation states to outsource the fabrication of high-performance ICs. Outsourcing fabrication presents a security threat because the black-box nature of a fabricated IC makes comprehensive inspection infeasible. Since prior work shows the feasibility of fabrication-time attackers’ evasion of existing post-fabrication defenses, IC designers must be able to protect their physical designs before handing them off to an untrusted foundry. To this end, recent work suggests methods to harden IC layouts against attack. Unfortunately, no tool exists to assess the effectiveness of the proposed defenses, thus leaving defensive gaps.This paper presents an extensible IC layout security analysis tool called IC Attack Surface (ICAS) that quantifies defensive coverage. For researchers, ICAS identifies gaps for future defenses to target, and enables the quantitative comparison of existing and future defenses. For practitioners, ICAS enables the exploration of the impact of design decisions on an IC’s resilience to fabrication-time attack. ICAS takes a set of metrics that encode the challenge of inserting a hardware Trojan into an IC layout, a set of attacks that the defender cares about, and a completed IC layout and reports the number of ways an attacker can add each attack to the design. While the ideal score is zero, practically, we find that lower scores correlate with increased attacker effort.To demonstrate ICAS’ ability to reveal defensive gaps, we analyze over 60 layouts of three real-world hardware designs (a processor, AES and DSP accelerators), protected with existing defenses. We evaluate the effectiveness of each circuit–defense combination against three representative attacks from the literature. Results show that some defenses are ineffective and others, while effective at reducing the attack surface, leave 10’s to 1000’s of unique attack implementations that an attacker can exploit.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"84 2 1","pages":"1742-1759"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76113041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers 干预中间商:节省数据的移动浏览器风险的实证分析
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00077
Brian Kondracki, Assel Aliyeva, Manuel Egele, Jason Polakis, Nick Nikiforakis
Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data plan constraints remain a significant concern for users. As a result, data-saving features can be a differentiating factor when selecting a mobile browser. In this paper, we present a comprehensive exploration of the security and privacy threat that data-saving functionality presents to users. We conduct the first analysis of Android’s data-saving browser (DSB) ecosystem across multiple dimensions, including the characteristics of the various browsers’ infrastructure, their application and protocol-level behavior, and their effect on users’ browsing experience. Our research unequivocally demonstrates that enabling data-saving functionality in major browsers results in significant degradation of the user’s security posture by introducing severe vulnerabilities that are not otherwise present in the browser during normal operation. In summary, our experiments show that enabling data savings exposes users to (i) proxy servers running outdated software, (ii) man-in-the-middle attacks due to problematic validation of TLS certificates, (iii) weakened TLS cipher suite selection, (iv) lack of support of security headers like HSTS, and (v) a higher likelihood of being labelled as bots. While the discovered issues can be addressed, we argue that data-saving functionality presents inherent risks in an increasingly-encrypted Web, and users should be alerted of the critical savings-vs-security trade-off that they implicitly accept every time they enable such functionality.
移动浏览器已经成为我们在线活动的主要媒介之一。然而,随着网页规模的不断扩大和流动媒体的普及,移动数据计划的限制仍然是用户关注的重要问题。因此,在选择移动浏览器时,数据保存功能可能是一个区分因素。在本文中,我们全面探讨了数据保存功能给用户带来的安全和隐私威胁。我们从多个维度对Android的数据保存浏览器(DSB)生态系统进行了首次分析,包括各种浏览器的基础设施特征、应用程序和协议级行为,以及它们对用户浏览体验的影响。我们的研究明确表明,在主流浏览器中启用数据保存功能会导致用户的安全状况显著下降,因为它会引入浏览器在正常操作期间不会出现的严重漏洞。总之,我们的实验表明,启用数据保存会使用户暴露于(i)运行过时软件的代理服务器,(ii)由于TLS证书验证有问题而导致的中间人攻击,(iii)削弱TLS密码套件选择,(iv)缺乏对HSTS等安全标头的支持,以及(v)被标记为机器人的可能性更高。虽然发现的问题可以解决,但我们认为数据保存功能在日益加密的Web中存在固有的风险,并且应该提醒用户注意每次启用此类功能时他们隐含地接受的关键的节省与安全权衡。
{"title":"Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers","authors":"Brian Kondracki, Assel Aliyeva, Manuel Egele, Jason Polakis, Nick Nikiforakis","doi":"10.1109/SP40000.2020.00077","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00077","url":null,"abstract":"Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data plan constraints remain a significant concern for users. As a result, data-saving features can be a differentiating factor when selecting a mobile browser. In this paper, we present a comprehensive exploration of the security and privacy threat that data-saving functionality presents to users. We conduct the first analysis of Android’s data-saving browser (DSB) ecosystem across multiple dimensions, including the characteristics of the various browsers’ infrastructure, their application and protocol-level behavior, and their effect on users’ browsing experience. Our research unequivocally demonstrates that enabling data-saving functionality in major browsers results in significant degradation of the user’s security posture by introducing severe vulnerabilities that are not otherwise present in the browser during normal operation. In summary, our experiments show that enabling data savings exposes users to (i) proxy servers running outdated software, (ii) man-in-the-middle attacks due to problematic validation of TLS certificates, (iii) weakened TLS cipher suite selection, (iv) lack of support of security headers like HSTS, and (v) a higher likelihood of being labelled as bots. While the discovered issues can be addressed, we argue that data-saving functionality presents inherent risks in an increasingly-encrypted Web, and users should be alerted of the critical savings-vs-security trade-off that they implicitly accept every time they enable such functionality.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"810-824"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81779095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity 智能合约的语义理解:可靠的可执行操作语义
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00066
Jiao Jiao, Shuanglong Kan, Shang-Wei Lin, David Sanán, Yang Liu, Jun Sun
Bitcoin has been a popular research topic recently. Ethereum (ETH), a second generation of cryptocurrency, extends Bitcoin’s design by offering a Turing-complete programming language called Solidity to develop smart contracts. Smart contracts allow creditable execution of contracts on EVM (Ethereum Virtual Machine) without third parties. Developing correct and secure smart contracts is challenging due to the decentralized computation nature of the blockchain. Buggy smart contracts may lead to huge financial loss. Furthermore, smart contracts are very hard, if not impossible, to patch once they are deployed. Thus, there is a recent surge of interest in analyzing and verifying smart contracts. While most of the existing works either focus on EVM bytecode or translate Solidity smart contracts into programs in intermediate languages, we argue that it is important and necessary to understand and formally define the semantics of Solidity since programmers write and reason about smart contracts at the level of source code. In this work, we develop a formal semantics for Solidity which provides a formal specification of smart contracts to define semantic-level security properties for the high-level verification. Furthermore, the proposed semantics defines correct and secure high-level execution behaviours of smart contracts to reason about compiler bugs and assist developers in writing secure smart contracts.
比特币最近一直是一个热门的研究话题。以太坊(ETH)是第二代加密货币,通过提供一种称为Solidity的图灵完备编程语言来开发智能合约,扩展了比特币的设计。智能合约允许在没有第三方的情况下在EVM(以太坊虚拟机)上可信地执行合约。由于区块链的分散式计算特性,开发正确且安全的智能合约具有挑战性。有漏洞的智能合约可能会导致巨大的经济损失。此外,智能合约一旦部署,即使不是不可能,也很难修补。因此,最近人们对分析和验证智能合约的兴趣激增。虽然大多数现有的工作要么集中在EVM字节码,要么将Solidity智能合约翻译成中间语言的程序,但我们认为理解和正式定义Solidity的语义是重要和必要的,因为程序员在源代码级别编写和推理智能合约。在这项工作中,我们为Solidity开发了一种形式化语义,它提供了智能合约的形式化规范,以定义用于高级验证的语义级安全属性。此外,提议的语义定义了智能合约的正确和安全的高级执行行为,以推断编译器的错误,并帮助开发人员编写安全的智能合约。
{"title":"Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity","authors":"Jiao Jiao, Shuanglong Kan, Shang-Wei Lin, David Sanán, Yang Liu, Jun Sun","doi":"10.1109/SP40000.2020.00066","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00066","url":null,"abstract":"Bitcoin has been a popular research topic recently. Ethereum (ETH), a second generation of cryptocurrency, extends Bitcoin’s design by offering a Turing-complete programming language called Solidity to develop smart contracts. Smart contracts allow creditable execution of contracts on EVM (Ethereum Virtual Machine) without third parties. Developing correct and secure smart contracts is challenging due to the decentralized computation nature of the blockchain. Buggy smart contracts may lead to huge financial loss. Furthermore, smart contracts are very hard, if not impossible, to patch once they are deployed. Thus, there is a recent surge of interest in analyzing and verifying smart contracts. While most of the existing works either focus on EVM bytecode or translate Solidity smart contracts into programs in intermediate languages, we argue that it is important and necessary to understand and formally define the semantics of Solidity since programmers write and reason about smart contracts at the level of source code. In this work, we develop a formal semantics for Solidity which provides a formal specification of smart contracts to define semantic-level security properties for the high-level verification. Furthermore, the proposed semantics defines correct and secure high-level execution behaviours of smart contracts to reason about compiler bugs and assist developers in writing secure smart contracts.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"1695-1712"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82098174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses 从自然的角度看智能家居的实际安全和安全分析
Pub Date : 2020-05-01 DOI: 10.1109/SP40000.2020.00062
Sunil Manandhar, Kevin Moran, Kaushal Kafle, Ruhao Tang, D. Poshyvanyk, Adwait Nadkarni
Designing practical security systems for the smart home is challenging without the knowledge of realistic home usage. This paper describes the design and implementation of Hεlion, a framework that generates natural home automation scenarios by identifying the regularities in user-driven home automation sequences, which are in turn generated from routines created by end-users. Our key hypothesis is that smart home event sequences created by users exhibit inherent semantic patterns, or naturalness that can be modeled and used to generate valid and useful scenarios. To evaluate our approach, we first empirically demonstrate that this naturalness hypothesis holds, with a corpus of 30,518 home automation events, constructed from 273 routines collected from 40 users. We then demonstrate that the scenarios generated by Hεlion seem valid to end-users, through two studies with 16 external evaluators. We further demonstrate the usefulness of Hεlion’s scenarios by addressing the challenge of policy specification, and using Hεlion to generate 17 security/safety policies with minimal effort. We distill 16 key findings from our results that demonstrate the strengths of our approach, surprising aspects of home automation, as well as challenges and opportunities in this rapidly growing domain.
在不了解实际家庭使用情况的情况下,为智能家居设计实用的安全系统是具有挑战性的。本文描述了Hεlion框架的设计和实现,该框架通过识别用户驱动的家庭自动化序列中的规律来生成自然的家庭自动化场景,而用户驱动的家庭自动化序列又由最终用户创建的例程生成。我们的关键假设是,用户创建的智能家居事件序列表现出固有的语义模式,或者可以建模并用于生成有效和有用的场景的自然性。为了评估我们的方法,我们首先通过从40个用户收集的273例程构建的30,518个家庭自动化事件的语料库,实证地证明了这种自然性假设成立。然后,通过与16个外部评估者的两项研究,我们证明了Hεlion生成的场景对最终用户似乎是有效的。我们通过解决策略规范的挑战,并使用Hεlion以最小的努力生成17个安全/安全策略,进一步证明了Hεlion场景的有用性。我们从我们的结果中提炼出16个关键发现,这些发现展示了我们的方法的优势,家庭自动化的令人惊讶的方面,以及这个快速增长领域的挑战和机遇。
{"title":"Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses","authors":"Sunil Manandhar, Kevin Moran, Kaushal Kafle, Ruhao Tang, D. Poshyvanyk, Adwait Nadkarni","doi":"10.1109/SP40000.2020.00062","DOIUrl":"https://doi.org/10.1109/SP40000.2020.00062","url":null,"abstract":"Designing practical security systems for the smart home is challenging without the knowledge of realistic home usage. This paper describes the design and implementation of Hεlion, a framework that generates natural home automation scenarios by identifying the regularities in user-driven home automation sequences, which are in turn generated from routines created by end-users. Our key hypothesis is that smart home event sequences created by users exhibit inherent semantic patterns, or naturalness that can be modeled and used to generate valid and useful scenarios. To evaluate our approach, we first empirically demonstrate that this naturalness hypothesis holds, with a corpus of 30,518 home automation events, constructed from 273 routines collected from 40 users. We then demonstrate that the scenarios generated by Hεlion seem valid to end-users, through two studies with 16 external evaluators. We further demonstrate the usefulness of Hεlion’s scenarios by addressing the challenge of policy specification, and using Hεlion to generate 17 security/safety policies with minimal effort. We distill 16 key findings from our results that demonstrate the strengths of our approach, surprising aspects of home automation, as well as challenges and opportunities in this rapidly growing domain.","PeriodicalId":6849,"journal":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","volume":"9 1","pages":"482-499"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89923968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2020 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1