首页 > 最新文献

Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium最新文献

英文 中文
Back-Propagating System Dependency Impact for Attack Investigation 反向传播系统依赖对攻击调查的影响
Pub Date : 2021-10-11 DOI: 10.5281/ZENODO.5559214
Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang Ye, Zhuotao Liu, Xusheng Xiao
Causality analysis on system auditing data has emerged as an important solution for attack investigation. Given a POI (Point-Of-Interest) event (e.g., an alert fired on a suspicious file creation), causality analysis constructs a dependency graph, in which nodes represent system entities (e.g., processes and files) and edges represent dependencies among entities, to reveal the attack sequence. However, causality analysis often produces a huge graph (> 100,000 edges) that is hard for security analysts to inspect. From the dependency graphs of various attacks, we observe that (1) dependencies that are highly related to the POI event often exhibit a different set of properties (e.g., data flow and time) from the lessrelevant dependencies; (2) the POI event is often related to a few attack entries (e.g., downloading a file). Based on these insights, we propose DEPIMPACT, a framework that identifies the critical component of a dependency graph (i.e., a subgraph) by (1) assigning discriminative dependency weights to edges to distinguish critical edges that represent the attack sequence from less-important dependencies, (2) propagating dependency impacts backward from the POI event to entry points, and (3) performing forward causality analysis from the top-ranked entry nodes based on their dependency impacts to filter out edges that are not found in the forward causality analysis. Our evaluations on the 150 million real system auditing events of real attacks and the DARPA TC dataset show that DEPIMPACT can significantly reduce the large dependency graphs (∼ 1,000,000 edges) to a small graph (∼ 234 edges), which is 4611× smaller. The comparison with the other state-of-the-art causality analysis techniques shows that DEPIMPACT is 106× more effective in reducing the dependency graphs while preserving the attack sequences.
系统审计数据的因果关系分析已经成为攻击调查的重要解决方案。给定一个POI (Point-Of-Interest)事件(例如,对可疑文件创建发出警报),因果关系分析构建一个依赖关系图,其中节点表示系统实体(例如,进程和文件),边表示实体之间的依赖关系,以揭示攻击序列。然而,因果关系分析通常会产生一个巨大的图(> 100,000条边),这对安全分析师来说很难检查。从各种攻击的依赖关系图中,我们观察到:(1)与POI事件高度相关的依赖关系通常表现出与不太相关的依赖关系不同的属性集(例如,数据流和时间);(2) POI事件通常与几个攻击条目(例如,下载文件)有关。基于这些见解,我们提出了DEPIMPACT,一个识别依赖图(即子图)关键组件的框架,通过(1)为边缘分配判别依赖权重,以区分代表攻击序列的关键边缘和不太重要的依赖关系,(2)将依赖影响从POI事件向后传播到入口点,(3)对排名靠前的入口节点进行前向因果分析,过滤掉前向因果分析中没有发现的边。我们对1.5亿个真实攻击的真实系统审计事件和DARPA TC数据集的评估表明,DEPIMPACT可以显着将大型依赖图(~ 1,000,000条边)减少到一个小图(~ 234条边),其大小为4611倍。与其他最先进的因果分析技术的比较表明,DEPIMPACT在保留攻击序列的同时减少依赖图的效率提高了106倍。
{"title":"Back-Propagating System Dependency Impact for Attack Investigation","authors":"Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang Ye, Zhuotao Liu, Xusheng Xiao","doi":"10.5281/ZENODO.5559214","DOIUrl":"https://doi.org/10.5281/ZENODO.5559214","url":null,"abstract":"Causality analysis on system auditing data has emerged as an important solution for attack investigation. Given a POI (Point-Of-Interest) event (e.g., an alert fired on a suspicious file creation), causality analysis constructs a dependency graph, in which nodes represent system entities (e.g., processes and files) and edges represent dependencies among entities, to reveal the attack sequence. However, causality analysis often produces a huge graph (> 100,000 edges) that is hard for security analysts to inspect. From the dependency graphs of various attacks, we observe that (1) dependencies that are highly related to the POI event often exhibit a different set of properties (e.g., data flow and time) from the lessrelevant dependencies; (2) the POI event is often related to a few attack entries (e.g., downloading a file). Based on these insights, we propose DEPIMPACT, a framework that identifies the critical component of a dependency graph (i.e., a subgraph) by (1) assigning discriminative dependency weights to edges to distinguish critical edges that represent the attack sequence from less-important dependencies, (2) propagating dependency impacts backward from the POI event to entry points, and (3) performing forward causality analysis from the top-ranked entry nodes based on their dependency impacts to filter out edges that are not found in the forward causality analysis. Our evaluations on the 150 million real system auditing events of real attacks and the DARPA TC dataset show that DEPIMPACT can significantly reduce the large dependency graphs (∼ 1,000,000 edges) to a small graph (∼ 234 edges), which is 4611× smaller. The comparison with the other state-of-the-art causality analysis techniques shows that DEPIMPACT is 106× more effective in reducing the dependency graphs while preserving the attack sequences.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"32 1","pages":"2461-2478"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74996953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Accurately Measuring Global Risk of Amplification Attacks using AmpMap 使用AmpMap精确测量放大攻击的全球风险
Pub Date : 2021-09-30 DOI: 10.1184/R1/16709587.V1
Soo-Jin Moon, Yucheng Yin, R. Sharma, Yifei Yuan, Jonathan M. Spring, V. Sekar
Many recent DDoS attacks rely on amplification, where an attacker induces public servers to generate a large volume of network traffic to a victim. In this paper, we argue for a low-footprint Internet health monitoring service that can systematically and continuously quantify this risk to inform mitigation efforts. Unfortunately, the problem is challenging because amplification is a complex function of query (header) values and server instances. As such, existing techniques that enumerate the total number of servers or focus on a specific amplification-inducing query are fundamentally imprecise. In designing AmpMap, we leverage key structural insights to develop an efficient approach that searches across the space of protocol headers and servers. Using AmpMap, we scanned thousands of servers for 6 UDP-based protocols. We find that relying on prior recommendations to block or rate-limit specific queries still leaves open substantial residual risk as they miss many other amplification-inducing query patterns. We also observe significant variability across servers and protocols, and thus prior approaches that rely on server census can substantially misestimate amplification risk.
最近的许多DDoS攻击依赖于放大,攻击者诱导公共服务器向受害者产生大量网络流量。在本文中,我们提出了一种低足迹的互联网健康监测服务,可以系统地、持续地量化这种风险,为缓解工作提供信息。不幸的是,这个问题很有挑战性,因为放大是查询(标头)值和服务器实例的复杂函数。因此,列举服务器总数或专注于特定放大诱导查询的现有技术从根本上说是不精确的。在设计AmpMap时,我们利用关键的结构洞察力来开发一种有效的方法,可以在协议头和服务器的空间中进行搜索。使用AmpMap,我们扫描了数千台服务器,找到了6种基于udp的协议。我们发现,依赖于先前的建议来阻止或限制特定的查询,仍然会留下大量的剩余风险,因为它们错过了许多其他导致放大的查询模式。我们还观察到服务器和协议之间的显著差异,因此依赖于服务器普查的先前方法可能会严重错误地估计放大风险。
{"title":"Accurately Measuring Global Risk of Amplification Attacks using AmpMap","authors":"Soo-Jin Moon, Yucheng Yin, R. Sharma, Yifei Yuan, Jonathan M. Spring, V. Sekar","doi":"10.1184/R1/16709587.V1","DOIUrl":"https://doi.org/10.1184/R1/16709587.V1","url":null,"abstract":"Many recent DDoS attacks rely on amplification, where an attacker induces public servers to generate a large volume of network traffic to a victim. In this paper, we argue for a low-footprint Internet health monitoring service that can systematically and continuously quantify this risk to inform mitigation efforts. Unfortunately, the problem is challenging because amplification is a complex function of query (header) values and server instances. As such, existing techniques that enumerate the total number of servers or focus on a specific amplification-inducing query are fundamentally imprecise. In designing AmpMap, we leverage key structural insights to develop an efficient approach that searches across the space of protocol headers and servers. Using AmpMap, we scanned thousands of servers for 6 UDP-based protocols. We find that relying on prior recommendations to block or rate-limit specific queries still leaves open substantial residual risk as they miss many other amplification-inducing query patterns. We also observe significant variability across servers and protocols, and thus prior approaches that rely on server census can substantially misestimate amplification risk.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"17 1","pages":"3881-3898"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79217890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Security Obstacles and Motivations for Small Businesses from a CISO's Perspective 从CISO的角度看小型企业的安全障碍和动机
Pub Date : 2021-01-01 DOI: 10.13016/M2RCS6-O3WQ
Flynn Wolf, Adam J. Aviv, Ravi Kuber
Small businesses (SBs) are often ill-informed and underresourced against increasing online threats. Chief Information Security Officers (CISOs) have a key role in contextualizing trade-offs between competing costs and priorities for SB management. To explore the challenges CISOs face when guiding SBs towards improved security we conducted two interview studies. Firstly, an exploratory study with CISOs with SB experience to identify themes related to their work (n=8). Secondly, we refined our methods and conducted broader structured interviews with a larger non-overlapping group of similarly qualified SB CISOs (n=19) to validate those themes and extend outcomes. We found CISOs confirmed common observations that SBs are generally unprepared for online threats, and uninformed about issues such as insurance and regulation. We also found that despite perceived usability problems with language and formatting, the effectiveness of government-authored guidance (a key reference source for CISOs and SBs) was deemed on par with commercial resources. These observations yield recommendations for better formatting, prioritizing, and timing of security guidance for SBs, such as better tailoring checklists, investment suggestions, and scenario-based exercises.
小型企业(SBs)通常缺乏信息和资源来应对日益增加的在线威胁。首席信息安全官(ciso)在企业安全管理的竞争成本和优先级之间的权衡方面发挥着关键作用。为了探索ciso在指导SBs改进安全性时面临的挑战,我们进行了两次访谈研究。首先,对具有SB经验的ciso进行探索性研究,以确定与其工作相关的主题(n=8)。其次,我们改进了我们的方法,并对一个更大的相同资格的SB首席信息安全官(n=19)进行了更广泛的结构化访谈,以验证这些主题并扩展结果。我们发现ciso证实了常见的观察结果,即SBs通常对在线威胁没有准备,并且不了解保险和监管等问题。我们还发现,尽管存在语言和格式方面的可用性问题,但政府编写的指南(ciso和SBs的关键参考来源)的有效性被认为与商业资源相当。这些观察结果为SBs的安全性指导提供了更好的格式、优先级和时间安排建议,例如更好地定制检查清单、投资建议和基于场景的练习。
{"title":"Security Obstacles and Motivations for Small Businesses from a CISO's Perspective","authors":"Flynn Wolf, Adam J. Aviv, Ravi Kuber","doi":"10.13016/M2RCS6-O3WQ","DOIUrl":"https://doi.org/10.13016/M2RCS6-O3WQ","url":null,"abstract":"Small businesses (SBs) are often ill-informed and underresourced against increasing online threats. Chief Information Security Officers (CISOs) have a key role in contextualizing trade-offs between competing costs and priorities for SB management. To explore the challenges CISOs face when guiding SBs towards improved security we conducted two interview studies. Firstly, an exploratory study with CISOs with SB experience to identify themes related to their work (n=8). Secondly, we refined our methods and conducted broader structured interviews with a larger non-overlapping group of similarly qualified SB CISOs (n=19) to validate those themes and extend outcomes. We found CISOs confirmed common observations that SBs are generally unprepared for online threats, and uninformed about issues such as insurance and regulation. We also found that despite perceived usability problems with language and formatting, the effectiveness of government-authored guidance (a key reference source for CISOs and SBs) was deemed on par with commercial resources. These observations yield recommendations for better formatting, prioritizing, and timing of security guidance for SBs, such as better tailoring checklists, investment suggestions, and scenario-based exercises.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"76 1","pages":"1199-1216"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85748374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols 噪声的频谱分析:对Diffie-Hellman协议的全面、自动化、形式化分析
Pub Date : 2020-08-12 DOI: 10.3929/ETHZ-B-000448132
Guillaume Girol, L. Hirschi, R. Sasse, Dennis Jackson, C. Cremers, D. Basin
The Noise specification describes how to systematically construct a large family of Diffie-Hellman based key exchange protocols, including the secure transports used by WhatsApp, Lightning, and WireGuard. As the specification only makes informal security claims, earlier work has explored which formal security properties may be enjoyed by protocols in the Noise framework, yet many important questions remain open. In this work we provide the most comprehensive, systematic analysis of the Noise framework to date. We start from first principles and, using an automated analysis tool, compute the strongest threat model under which a protocol is secure, thus enabling formal comparison between protocols. Our results allow us to objectively and automatically associate each informal security level presented in the Noise specification with a formal security claim. We also provide a fine-grained separation of Noise protocols that were previously described as offering similar security properties, revealing a subclass for which alternative Noise protocols exist that offer strictly better security guarantees. Our analysis also uncovers missing assumptions in the Noise specification and some surprising consequences, e.g., in some situations higher security levels yield strictly worse security.
Noise规范描述了如何系统地构建一个基于Diffie-Hellman的密钥交换协议大家庭,包括WhatsApp、Lightning和WireGuard使用的安全传输。由于规范只提出了非正式的安全声明,早期的工作已经探索了噪声框架中的协议可以享受哪些正式的安全属性,但是许多重要的问题仍然没有解决。在这项工作中,我们提供了迄今为止最全面、系统的噪声框架分析。我们从第一原则出发,使用自动分析工具,计算协议安全的最强威胁模型,从而实现协议之间的正式比较。我们的结果允许我们客观和自动地将Noise规范中呈现的每个非正式安全级别与正式的安全声明联系起来。我们还对噪声协议进行了细粒度的分离,这些协议之前被描述为提供类似的安全属性,从而揭示了一个子类,该子类存在可替代的噪声协议,这些协议提供了严格更好的安全保证。我们的分析还揭示了噪声规范中缺失的假设和一些令人惊讶的结果,例如,在某些情况下,更高的安全级别会产生更差的安全性。
{"title":"A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols","authors":"Guillaume Girol, L. Hirschi, R. Sasse, Dennis Jackson, C. Cremers, D. Basin","doi":"10.3929/ETHZ-B-000448132","DOIUrl":"https://doi.org/10.3929/ETHZ-B-000448132","url":null,"abstract":"The Noise specification describes how to systematically construct a large family of Diffie-Hellman based key exchange protocols, including the secure transports used by WhatsApp, Lightning, and WireGuard. As the specification only makes informal security claims, earlier work has explored which formal security properties may be enjoyed by protocols in the Noise framework, yet many important questions remain open. In this work we provide the most comprehensive, systematic analysis of the Noise framework to date. We start from first principles and, using an automated analysis tool, compute the strongest threat model under which a protocol is secure, thus enabling formal comparison between protocols. Our results allow us to objectively and automatically associate each informal security level presented in the Noise specification with a formal security claim. We also provide a fine-grained separation of Noise protocols that were previously described as offering similar security properties, revealing a subclass for which alternative Noise protocols exist that offer strictly better security guarantees. Our analysis also uncovers missing assumptions in the Noise specification and some surprising consequences, e.g., in some situations higher security levels yield strictly worse security.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"51 1","pages":"1857-1874"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72689687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams Droplet:加密数据流的分散授权和访问控制
Pub Date : 2020-08-12 DOI: 10.3929/ETHZ-B-000443480
Hossein Shafagh, Lukas Burkhalter, S. Ratnasamy, Anwar Hithnawi
This paper presents Droplet, a decentralized data access control service. Droplet enables data owners to securely and selectively share their encrypted data while guaranteeing data confidentiality in the presence of unauthorized parties and compromised data servers. Droplet’s contribution lies in coupling two key ideas: (i) a cryptographically-enforced access control construction for encrypted data streams which enables users to define fine-grained stream-specific access policies, and (ii) a decentralized authorization service that serves userdefined access policies. In this paper, we present Droplet’s design, the reference implementation of Droplet, and the experimental results of three case-study applications deployed with Droplet: Fitbit activity tracker, Ava health tracker, and ECOviz smart meter dashboard, demonstrating Droplet’s applicability for secure sharing of IoT streams.
本文提出了分布式数据访问控制服务Droplet。Droplet使数据所有者能够安全地、有选择地共享其加密数据,同时在未经授权方和受损数据服务器存在的情况下保证数据的机密性。Droplet的贡献在于将两个关键思想结合在一起:(i)加密数据流的加密强制访问控制结构,使用户能够定义细粒度流特定的访问策略,以及(ii)为用户定义的访问策略提供分散的授权服务。在本文中,我们介绍了Droplet的设计,Droplet的参考实现,以及部署Droplet的三个案例研究应用程序(Fitbit活动跟踪器,Ava健康跟踪器和ECOviz智能仪表仪表板)的实验结果,展示了Droplet在物联网流安全共享方面的适用性。
{"title":"Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams","authors":"Hossein Shafagh, Lukas Burkhalter, S. Ratnasamy, Anwar Hithnawi","doi":"10.3929/ETHZ-B-000443480","DOIUrl":"https://doi.org/10.3929/ETHZ-B-000443480","url":null,"abstract":"This paper presents Droplet, a decentralized data access control service. Droplet enables data owners to securely and selectively share their encrypted data while guaranteeing data confidentiality in the presence of unauthorized parties and compromised data servers. Droplet’s contribution lies in coupling two key ideas: (i) a cryptographically-enforced access control construction for encrypted data streams which enables users to define fine-grained stream-specific access policies, and (ii) a decentralized authorization service that serves userdefined access policies. In this paper, we present Droplet’s design, the reference implementation of Droplet, and the experimental results of three case-study applications deployed with Droplet: Fitbit activity tracker, Ava health tracker, and ECOviz smart meter dashboard, demonstrating Droplet’s applicability for secure sharing of IoT streams.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"10 1","pages":"2469-2486"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75527115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment 广告拦截器对产品搜索和购买行为的影响:一个实验室实验
Pub Date : 2020-01-01 DOI: 10.1184/R1/13653134.V1
Alisa Frik, A. Haviland, A. Acquisti
. Ad-blocking applications have become increasingly popular among Internet users. Ad-blockers offer various privacy- and security-enhancing features: they can reduce personal data collection and exposure to malicious advertising, help safeguard users' decision-making autonomy, reduce users' costs (by increasing the speed of page loading), and improve the browsing experience (by reducing visual clutter). On the other hand, the online advertising industry has claimed that ads increase consumers' economic welfare by helping them find better, cheaper deals faster. If so, using ad-blockers would deprive consumers of these benefits. However, little is known about the actual economic impact of ad-blockers. We designed a lab experiment (N=212) with real economic incentives to understand the impact of ad-blockers on consumers' product searching and purchasing behavior, and the resulting consumer outcomes. We focus on the effects of blocking contextual ads (ads targeted to individual, potentially sensitive, contexts, such as search queries in a search engine or the content of web pages) on how participants searched for and purchased various products online, and the resulting consumer welfare. We find that blocking contextual ads did not have a statistically significant effect on the prices of products participants chose to purchase, the time they spent searching for them, or how satisfied they were with the chosen products, prices, and perceived quality. Hence we do not reject the null hypothesis that consumer behavior and outcomes stay constant when such ads are blocked or shown. We conclude that the use of ad-blockers does not seem to compromise consumer economic welfare (along the metrics captured in the experiment) in exchange for privacy and security benefits. We discuss the implications of this work in terms of end-users' privacy, the study's limitations, and future work to extend these results.Presented at the 29th USENIX Security Symposium, August 12-14, 2020
. 广告拦截应用程序在互联网用户中越来越受欢迎。广告拦截器提供了各种隐私和安全增强功能:它们可以减少个人数据收集和暴露于恶意广告,帮助保护用户的决策自主权,降低用户的成本(通过提高页面加载速度),并改善浏览体验(通过减少视觉混乱)。另一方面,在线广告行业声称,广告通过帮助消费者更快地找到更好、更便宜的交易,增加了消费者的经济福利。如果是这样,使用广告拦截软件将剥夺消费者的这些好处。然而,人们对广告拦截软件的实际经济影响知之甚少。我们设计了一个具有真实经济激励的实验室实验(N=212),以了解广告拦截器对消费者产品搜索和购买行为的影响,以及由此产生的消费者结果。我们专注于阻止上下文广告(针对个人,潜在敏感的上下文的广告,例如搜索引擎中的搜索查询或网页内容)对参与者如何在线搜索和购买各种产品的影响,以及由此产生的消费者福利。我们发现,阻止上下文广告对参与者选择购买的产品的价格、他们花在搜索这些产品上的时间,以及他们对所选产品、价格和感知质量的满意程度没有统计学上的显著影响。因此,我们不反对零假设,即当此类广告被屏蔽或显示时,消费者的行为和结果保持不变。我们得出的结论是,使用广告拦截器似乎不会损害消费者的经济福利(根据实验中捕获的指标),以换取隐私和安全利益。我们讨论了这项工作在最终用户隐私方面的影响,研究的局限性,以及未来扩展这些结果的工作。在第29届USENIX安全研讨会上发表,2020年8月12日至14日
{"title":"The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment","authors":"Alisa Frik, A. Haviland, A. Acquisti","doi":"10.1184/R1/13653134.V1","DOIUrl":"https://doi.org/10.1184/R1/13653134.V1","url":null,"abstract":". Ad-blocking applications have become increasingly popular among Internet users. Ad-blockers offer various privacy- and security-enhancing features: they can reduce personal data collection and exposure to malicious advertising, help safeguard users' decision-making autonomy, reduce users' costs (by increasing the speed of page loading), and improve the browsing experience (by reducing visual clutter). On the other hand, the online advertising industry has claimed that ads increase consumers' economic welfare by helping them find better, cheaper deals faster. If so, using ad-blockers would deprive consumers of these benefits. However, little is known about the actual economic impact of ad-blockers. We designed a lab experiment (N=212) with real economic incentives to understand the impact of ad-blockers on consumers' product searching and purchasing behavior, and the resulting consumer outcomes. We focus on the effects of blocking contextual ads (ads targeted to individual, potentially sensitive, contexts, such as search queries in a search engine or the content of web pages) on how participants searched for and purchased various products online, and the resulting consumer welfare. We find that blocking contextual ads did not have a statistically significant effect on the prices of products participants chose to purchase, the time they spent searching for them, or how satisfied they were with the chosen products, prices, and perceived quality. Hence we do not reject the null hypothesis that consumer behavior and outcomes stay constant when such ads are blocked or shown. We conclude that the use of ad-blockers does not seem to compromise consumer economic welfare (along the metrics captured in the experiment) in exchange for privacy and security benefits. We discuss the implications of this work in terms of end-users' privacy, the study's limitations, and future work to extend these results.Presented at the 29th USENIX Security Symposium, August 12-14, 2020","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"9 1","pages":"163-179"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88386276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme 加密货币泵和转储方案的解剖
Pub Date : 2018-11-25 DOI: 10.5555/3361338.3361450
Jiahua Xu, B. Livshits
While pump-and-dump schemes have attracted the attention of cryptocurrency observers and regulators alike, this paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets. We present a case study of a recent pump-and-dump event, investigate 412 pump-and-dump activities organized in Telegram channels from June 17, 2018 to February 26, 2019, and discover patterns in crypto-markets associated with pump-and-dump schemes. We then build a model that predicts the pump likelihood of all coins listed in a crypto-exchange prior to a pump. The model exhibits high precision as well as robustness, and can be used to create a simple, yet very effective trading strategy, which we empirically demonstrate can generate a return as high as 60% on small retail investments within a span of two and half months. The study provides a proof of concept for strategic crypto-trading and sheds light on the application of machine learning for crime detection.
虽然泵和转储计划引起了加密货币观察家和监管机构的注意,但本文代表了加密货币市场中泵和转储活动的第一个详细的实证查询。我们对最近的抽水和转储事件进行了案例研究,调查了2018年6月17日至2019年2月26日在Telegram频道组织的412次抽水和转储活动,并发现了与抽水和转储计划相关的加密市场模式。然后,我们建立了一个模型,预测加密货币交易所中列出的所有硬币在泵之前的泵可能性。该模型具有很高的精度和鲁棒性,可以用来创建一个简单但非常有效的交易策略,我们的经验证明,在两个半月的时间内,小型零售投资可以产生高达60%的回报。该研究为战略性加密交易提供了概念证明,并揭示了机器学习在犯罪侦查中的应用。
{"title":"The Anatomy of a Cryptocurrency Pump-and-Dump Scheme","authors":"Jiahua Xu, B. Livshits","doi":"10.5555/3361338.3361450","DOIUrl":"https://doi.org/10.5555/3361338.3361450","url":null,"abstract":"While pump-and-dump schemes have attracted the attention of cryptocurrency observers and regulators alike, this paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets. We present a case study of a recent pump-and-dump event, investigate 412 pump-and-dump activities organized in Telegram channels from June 17, 2018 to February 26, 2019, and discover patterns in crypto-markets associated with pump-and-dump schemes. We then build a model that predicts the pump likelihood of all coins listed in a crypto-exchange prior to a pump. The model exhibits high precision as well as robustness, and can be used to create a simple, yet very effective trading strategy, which we empirically demonstrate can generate a return as high as 60% on small retail investments within a span of two and half months. The study provides a proof of concept for strategic crypto-trading and sheds light on the application of machine learning for crime detection.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"13 1","pages":"1609-1625"},"PeriodicalIF":0.0,"publicationDate":"2018-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82165549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Meltdown: Reading Kernel Memory from User Space 熔解:从用户空间读取内核内存
Moritz Lipp, Michael Schwarz, D. Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, S. Mangard, P. Kocher, Daniel Genkin, Y. Yarom, Michael Hamburg
The security of computer systems fundamentally relies on memory isolation, e.g., kernel address ranges are marked as non-accessible and are protected from user access. In this paper, we present Meltdown. Meltdown exploits side effects of out-of-order execution on modern processors to read arbitrary kernel-memory locations including personal data and passwords. Out-of-order execution is an indispensable performance feature and present in a wide range of modern processors. The attack is independent of the operating system, and it does not rely on any software vulnerabilities. Meltdown breaks all security guarantees provided by address space isolation as well as paravirtualized environments and, thus, every security mechanism building upon this foundation. On affected systems, Meltdown enables an adversary to read memory of other processes or virtual machines in the cloud without any permissions or privileges, affecting millions of customers and virtually every user of a personal computer. We show that the KAISER defense mechanism for KASLR has the important (but inadvertent) side effect of impeding Meltdown. We stress that KAISER must be deployed immediately to prevent large-scale exploitation of this severe information leakage.
计算机系统的安全性从根本上依赖于内存隔离,例如,内核地址范围被标记为不可访问,并对用户访问加以保护。在本文中,我们介绍了Meltdown。Meltdown利用现代处理器乱序执行的副作用来读取任意的内核内存位置,包括个人数据和密码。乱序执行是一个不可缺少的性能特征,在现代处理器中广泛存在。这种攻击不依赖于操作系统,也不依赖于任何软件漏洞。Meltdown会破坏由地址空间隔离和半虚拟化环境提供的所有安全保证,从而破坏建立在此基础上的所有安全机制。在受影响的系统上,Meltdown使攻击者能够在没有任何权限或特权的情况下读取云中的其他进程或虚拟机的内存,影响数百万客户和几乎每个个人计算机用户。我们表明KASLR的KAISER防御机制具有阻碍Meltdown的重要(但无意中)副作用。我们强调,必须立即部署KAISER,以防止大规模利用这一严重的信息泄露。
{"title":"Meltdown: Reading Kernel Memory from User Space","authors":"Moritz Lipp, Michael Schwarz, D. Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, S. Mangard, P. Kocher, Daniel Genkin, Y. Yarom, Michael Hamburg","doi":"10.1145/3357033","DOIUrl":"https://doi.org/10.1145/3357033","url":null,"abstract":"The security of computer systems fundamentally relies on memory isolation, e.g., kernel address ranges are marked as non-accessible and are protected from user access. In this paper, we present Meltdown. Meltdown exploits side effects of out-of-order execution on modern processors to read arbitrary kernel-memory locations including personal data and passwords. Out-of-order execution is an indispensable performance feature and present in a wide range of modern processors. The attack is independent of the operating system, and it does not rely on any software vulnerabilities. Meltdown breaks all security guarantees provided by address space isolation as well as paravirtualized environments and, thus, every security mechanism building upon this foundation. On affected systems, Meltdown enables an adversary to read memory of other processes or virtual machines in the cloud without any permissions or privileges, affecting millions of customers and virtually every user of a personal computer. We show that the KAISER defense mechanism for KASLR has the important (but inadvertent) side effect of impeding Meltdown. We stress that KAISER must be deployed immediately to prevent large-scale exploitation of this severe information leakage.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"180 1","pages":"973-990"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72717919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1060
Fast and Service-preserving Recovery from Malware Infections Using CRIU 使用CRIU从恶意软件感染中快速和保留服务的恢复
Ashton Webster, Ryan Eckenrod, James M. Purtilo
Once a computer system has been infected with malware, restoring it to an uninfected state often requires costly service-interrupting actions such as rolling back to a stable snapshot or reimaging the system entirely. We present CRIU-MR: a technique for restoring an infected server system running within a Linux container to an uninfected state in a service-preserving manner using Checkpoint/Restore in Userspace (CRIU). We modify the CRIU source code to flexibly integrate with existing malware detection technologies so that it can remove suspected malware processes within a Linux container during a checkpoint/restore event. This allows for infected containers with a potentially damaged filesystem to be checkpointed and subsequently restored on a fresh backup filesystem while both removing malware processes and preserving the state of trusted ones. This method can be quickly performed with minimal impact on service availability, restoring active TCP connections and completely removing several types of malware from infected Linux containers.
一旦计算机系统被恶意软件感染,将其恢复到未受感染的状态通常需要昂贵的服务中断操作,例如回滚到稳定的快照或完全重新映像系统。我们介绍了CRIU- mr:一种使用用户空间中的检查点/恢复(CRIU)以保留服务的方式将在Linux容器中运行的受感染服务器系统恢复到未感染状态的技术。我们修改了CRIU源代码,以灵活地与现有的恶意软件检测技术集成,以便在检查点/恢复事件期间删除Linux容器内可疑的恶意软件进程。这允许带有潜在损坏文件系统的受感染容器被检查点,随后在新的备份文件系统上恢复,同时删除恶意软件进程并保留受信任进程的状态。这种方法可以在对服务可用性影响最小的情况下快速执行,恢复活动TCP连接,并从受感染的Linux容器中完全删除几种类型的恶意软件。
{"title":"Fast and Service-preserving Recovery from Malware Infections Using CRIU","authors":"Ashton Webster, Ryan Eckenrod, James M. Purtilo","doi":"10.13016/M2QN5ZD12","DOIUrl":"https://doi.org/10.13016/M2QN5ZD12","url":null,"abstract":"Once a computer system has been infected with malware, restoring it to an uninfected state often requires costly service-interrupting actions such as rolling back to a stable snapshot or reimaging the system entirely. We present CRIU-MR: a technique for restoring an infected server system running within a Linux container to an uninfected state in a service-preserving manner using Checkpoint/Restore in Userspace (CRIU). We modify the CRIU source code to flexibly integrate with existing malware detection technologies so that it can remove suspected malware processes within a Linux container during a checkpoint/restore event. This allows for infected containers with a potentially damaged filesystem to be checkpointed and subsequently restored on a fresh backup filesystem while both removing malware processes and preserving the state of trusted ones. This method can be quickly performed with minimal impact on service availability, restoring active TCP connections and completely removing several types of malware from infected Linux containers.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"59 1","pages":"1199-1211"},"PeriodicalIF":0.0,"publicationDate":"2018-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90910369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management CLKSCREW:揭露能源管理安全隐患
Pub Date : 2017-01-01 DOI: 10.7916/d8-0ytv-3a53
Adrian Tang, S. Sethumadhavan, S. Stolfo
The need for power- and energy-efficient computing has resulted in aggressive cooperative hardware-software energy management mechanisms on modern commodity devices. Most systems today, for example, allow software to control the frequency and voltage of the underlying hardware at a very fine granularity to extend battery life. Despite their benefits, these software-exposed energy management mechanisms pose grave security implications that have not been studied before. In this work, we present the CLK SCREW attack, a new class of fault attacks that exploit the security-obliviousness of energy management mechanisms to break security. A novel benefit for the attackers is that these fault attacks become more accessible since they can now be conducted without the need for physical access to the devices or fault injection equipment. We demonstrate CLK SCREW on commodity ARM/Android devices. We show that a malicious kernel driver (1) can extract secret cryptographic keys from Trustzone, and (2) can escalate its privileges by loading self-signed code into Trustzone. As the first work to show the security ramifications of energy management mechanisms, we urge the community to re-examine these security-oblivious designs.
对电力和节能计算的需求导致了现代商品设备上积极合作的硬件-软件能源管理机制。例如,今天的大多数系统都允许软件以非常精细的粒度控制底层硬件的频率和电压,以延长电池寿命。尽管有这些好处,但这些软件暴露的能源管理机制带来了严重的安全隐患,这是以前没有研究过的。在这项工作中,我们提出了CLK SCREW攻击,这是一类新的故障攻击,它利用能源管理机制的安全遗忘来破坏安全性。对于攻击者来说,一个新的好处是这些故障攻击变得更容易进行,因为它们现在可以在不需要物理访问设备或故障注入设备的情况下进行攻击。我们在商用ARM/Android设备上演示了CLK SCREW。我们展示了恶意内核驱动程序(1)可以从Trustzone提取秘密加密密钥,并且(2)可以通过将自签名代码加载到Trustzone来升级其特权。作为展示能源管理机制的安全后果的第一个工作,我们敦促社区重新检查这些安全无关的设计。
{"title":"CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management","authors":"Adrian Tang, S. Sethumadhavan, S. Stolfo","doi":"10.7916/d8-0ytv-3a53","DOIUrl":"https://doi.org/10.7916/d8-0ytv-3a53","url":null,"abstract":"The need for power- and energy-efficient computing has resulted in aggressive cooperative hardware-software energy management mechanisms on modern commodity devices. Most systems today, for example, allow software to control the frequency and voltage of the underlying hardware at a very fine granularity to extend battery life. Despite their benefits, these software-exposed energy management mechanisms pose grave security implications that have not been studied before. In this work, we present the CLK SCREW attack, a new class of fault attacks that exploit the security-obliviousness of energy management mechanisms to break security. A novel benefit for the attackers is that these fault attacks become more accessible since they can now be conducted without the need for physical access to the devices or fault injection equipment. We demonstrate CLK SCREW on commodity ARM/Android devices. We show that a malicious kernel driver (1) can extract secret cryptographic keys from Trustzone, and (2) can escalate its privileges by loading self-signed code into Trustzone. As the first work to show the security ramifications of energy management mechanisms, we urge the community to re-examine these security-oblivious designs.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"95 1","pages":"1057-1074"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77282730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 227
期刊
Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1