[jsosug:00117] FYI: NDSS'10 プログラム

Back to archive index

Kuniyasu Suzaki k.suz****@aist*****
2010年 1月 5日 (火) 10:44:00 JST


須崎です。こちらのMLでも興味があると思いますので流します。

NDSS (Network and Distributed Systems Security Symposium) 2010 のプログ
ラムが公開されています。
http://www.isoc.org/isoc/conferences/ndss/10/program.shtml
Feb 28-Mar 3, San Diego, CA

USENIX Security 09 で Outstanding Student Paper だった Vanish の Sybil
Attack 攻撃が論文なっている。対応がはやい。

----------------------------------------------------------------------
Session 1: Distributed Systems and Networks

Server-side Verification of Client Behavior in Online Games
Darrell Bethea, Robert Cochran and Michael Reiter
  Online gaming is a lucrative industry, but one that is slowed by
  cheating that compromises the gaming experience and hence drives
  away players (and revenues). This paper develops a technique by
  which game developers can enable game operators to validate the
  behavior of game clients as being consistent with valid execution of
  the sanctioned client software. The paper demonstrates its approach
  in two case studies: one of the open-source game XPilot, and one of
  a multiplayer game similar to Pac-Man.

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten,
J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
  We examine the security of Vanish, a recent proposal for creating
  "self-destructing" data. Vanish works by encrypting messages and
  scattering the keys in a million-node DHT, where they remain
  accessible for only a few hours. We show that an attacker can defeat
  Vanish by conducting a large Sybil attack against the DHT and
  recording every value before it ages out. Optimizations allow the
  attacker to reduce the cost by more than two orders of magnitude
  from the Vanish authors' projections.

Stealth DoS Attacks on Secure Channels
Amir Herzberg and Haya Shulman
  Can security mechanisms in IP layer, protect TCP from
  denial/degradation (DoS) of service attacks, by a stealth adversary,
  who can eavesdrop and inject (few) packets? We present such attacks
  on IPsec without anti-replay window, and on IPsec with small
  anti-replay window. We subsequently show how to calculate correct
  size of anti-replay window. Then, we present a (slightly more
  elaborate) attack that works for any size window. Finally we propose
  modifications to IPsec gateway, that defend against the stealth DoS
  attacks.

Session 2: Web Security and Privacy

Protecting Browsers from Extension Vulnerabilities
Adam Barth, Adrienne Porter Felt, Prateek Saxena, and Aaron Boodman
  Buggy browser extensions can be exploited by malicious web site
  operators. In Firefox, these exploits are dangerous because
  extensions run with the user's full privileges, including local
  system access. We analyze 25 popular Firefox extensions and find
  that 88% need less than the full set of privileges. We propose a new
  browser extension platform based on least privilege, privilege
  separation, and strong isolation. Our design has been adopted as the
  Google Chrome extension system.

Adnostic: Privacy Preserving Targeted Advertising
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum and Solon Barocas
  Adnostic is a practical architecture and prototype implementation
  that enables targeted advertising without compromising user
  privacy. Behavioral profiling and targeting in Adnostic takes place
  in the browser while the ad network remains agnostic to the user's
  interests. Our paper discusses the effectiveness of the system as
  well as potential social engineering and web-based attacks on the
  architecture. We also describe a cryptographic billing system that
  lets ad networks bill the correct advertiser without knowing which
  ad was displayed to the user.

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
Prateek Saxena, Steve Hanna, Pongsin Poosankam and Dawn Song
  Much of the prior research on web application vulnerabilities has
  focused on server-side vulnerabilities. This paper highlights a new
  class of vulnerabilities, which we term client-side validation (or
  CSV) vulnerabilities, that arise due to improper validation in
  client-side JavaScript code and can result in a broad spectrum of
  attacks. We propose a new dynamic analysis technique to
  systematically discover this class of vulnerabilities that is
  light-weight, efficient and has no false positives. We implement our
  approach in a tool called FLAX. In our evaluation on live web
  applications, FLAX has found numerous CSV vulnerabilities in the
  wild, demonstrating both its practical scalability and the
  prevalence of this class of vulnerabilities in real-world
  applications.

Session 3: Intrusion Detection and Attack Analysis

Effective Anomaly Detection with Scarce Training Data
William Robertson, Federico Maggi, Christopher Kruegel and Giovanni Vigna
  Learning-based anomaly detection has proven to be an effective
  black-box technique for detecting unknown attacks. However, the
  technique crucially depends upon both the quality and the
  completeness of the training data, both of which are routinely
  lacking in real-world settings. In this work, we present an approach
  for remediating a local scarcity of training data by automatically
  leveraging similar, well-trained models from other sites. We
  experimentally demonstrate the efficacy of the approach in the
  context of web application anomaly detection over a data set of more
  than 58 million HTTP requests.

Large-Scale Automatic Classification of Phishing Pages
Colin Whittaker, Brian Ryner and Marria Nazif
  We present the design and performance characteristics of a scalable
  machine learning classifier that detects phishing websites. We use
  this classifier to maintain Google's phishing blacklist
  automatically, analyzing millions of potentially phishing pages
  every day. To train our classifier, we use a dataset consisting of
  millions of samples from previously classified pages labeled
  according to our published blacklist. Despite noise in the training
  labels, our classifier learns a robust model for identifying
  phishing pages which correctly classifies more than 90% of phishing
  pages several weeks after training concludes.

A Systematic Characterization of IM Threats using Honeypots
Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos and Spiros Antonatos
  The popularity of instant messaging (IM) services has recently
  attracted the interest of attackers that send malicious URLs or
  files to the contact lists of compromised instant messaging accounts
  or clients. This work aims to provide a systematic characterization
  of IM threats based on the information collected by HoneyBuddy, a
  honeypot-like infrastructure for detecting malicious activities in
  IM networks. We also deploy the prototype implementation of our
  myMSNhoneypot service, an early detection service that can inform
  users if their accounts or IM clients have been compromised.

Session 4: Spam

On Network-level Clusters for Spam Detection
Zhiyun Qian, Zhuoqing Mao, Yinglian Xie and Fang Yu
  Researchers have already recognized the need to identify IP clusters
  instead of focusing on individual IP addresses to construct
  blacklists for detecting spam. In this paper, building on BGP
  clusters, we propose a significantly improved clustering approach
  integrating both network origin and DNS information. False negative
  rate can be reduced by 30% - 50% using 7 month traces compared to
  directly applying various public IP-based blacklists and
  SpamAssassin without affecting false positive rate.

Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation
Sushant Sinha, Michael Bailey and Farnam Jahanian
  Spam constitutes a significant fraction of all e-mail connection
  attempts and routinely frustrates users, consumes resources, and
  serves as an infection vector for malicious software. In an effort
  to reduce the impact of these e-mails, operators have increasingly
  turned to course-grained, reputation-based, dynamic policy
  enforcement, or blacklisting. While scalable, blacklisting exhibits
  both false positives and false negatives. In this paper, we argue
  that blacklists should be tailored and present two techniques that
  leverage local perspectives to significantly improve blacklist
  accuracy.

Botnet Judo: Fighting Spam with Itself
Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, 
Vern Paxson, Nicholas Weaver and Stefan Savage
  Judo is a system for better filtering spam by exploiting the vantage
  point of the spammer. By instantiating and monitoring botnet hosts
  in a controlled environment, we are able to monitor new spam as it
  is created, and consequently infer the underlying template used to
  generate polymorphic e-mail messages. We demonstrate this approach
  on mail traces from a range of modern botnets and show that we can
  automatically filter such spam precisely and with virtually no false
  positives.

Session 5: Anonymity and Cryptographic Systems

Contractual Anonymity
Edward J. Schwartz, David Brumley and Jonathan M. McCune
  We propose, develop, and implement techniques for achieving
  contractual anonymity. In contractual anonymity, a user and service
  provider enter into an anonymity contract. The user is guaranteed
  anonymity and message unlinkability from the contractual anonymity
  system unless she breaks the contract. The service provider is
  guaranteed that it can identify users who break the contract. Our
  system can enforce many types of contract policies, is efficient,
  and has a small trusted computing base.

A3: An Extensible Platform for Application-Aware Anonymity
Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou and Boon Thau Loo
  This paper presents the design and implementation of
  Application-Aware Anonymity (A3), an extensible platform for
  deploying anonymity-based services on the Internet. A3 allows
  applications to tailor their anonymity and performance properties
  according to their communication requirements. To support flexible
  path construction, A3 exposes a declarative language (A3Log) that
  enables applications to compactly specify path selection and
  instantiation policies. A3Log is sufficiently versatile to represent
  novel multi-metric performance constraints as well as existing relay
  selection algorithms.

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography
Thomas Ristenpart and Scott Yilek
  Random number generators (RNGs) are consistently a weak link in the
  secure use of cryptography. Routine cryptographic operations such as
  encryption and signing can fail spectacularly given predictable or
  repeated randomness, even when using good long-lived key
  material. This has proved problematic in prior settings when RNG
  implementation bugs, poor design, or low-entropy sources have
  resulted in predictable randomness. We investigate a new way in
  which RNGs fail due to reuse of virtual machine (VM) snapshots. We
  exhibit such VM reset vulnerabilities in widely-used TLS clients and
  servers: the attacker takes advantage of (or forces) snapshot replay
  to compromise sessions or even expose a server's DSA signing
  key. Our next contribution is a backwards-compatible framework for
  hedging routine cryptographic operations against bad randomness,
  thereby mitigating the damage due to randomness failures. We apply
  our framework to the OpenSSL library and experimentally confirm that
  it has little overhead.

Session 6: Security Protocols and Policies

InvisiType: Object-Oriented Security Policies
Jiwon Seo and Monica S. Lam
  This paper proposes InvisiType, an object-oriented approach that
  enables platform developers to enforce safety checks on third-party
  extensions without requiring their cooperation. Developers
  encapsulate safety checks in an InvisiType policy class and
  selectively subjects objects at risk to these policies. The run-time
  enforces these policies by changing the types of these objects
  dynamically. Our InvisiType policies successfully found 19
  cross-site scripting vulnerabilities and 6 access control errors in
  total. The runtime overhead is small, indicating that the technique
  is practical.

A Security Evaluation of DNSSEC with NSEC3
Jason Bau and John Mitchell
  This paper studies the goals and operations of DNSSEC/NSEC3 and uses
  Murphi, a finite-state enumeration tool, to check its security
  properties in presence of a network attacker model. We uncover
  several weaknesses in DNSSEC, including incorrect dependencies in
  the signature chain and NSEC3 options that allow forged name
  insertion into a domain. We then confirm the exploitability of the
  NSEC3 vulnerability in a realistic laboratory DNSSEC domain. We
  finally offer implementation and configuration advice minimizing
  exploitability of the uncovered vulnerabilities.

On the Safety of Enterprise Policy Deployment
Yudong Gao, Ni Pan, Xu Chen and Z. Morley Mao
  We present the first work to address the security issues of
  enterprise policy deployment, an under-studied procedure that leaves
  security vulnerabilities if not carefully designed. We formally
  define insecure states during policy deployments and demonstrate
  their security implications with real examples. We further propose
  an efficient algorithm to generate deployment procedures that are
  free of insecure states, and implement it on Group Policy framework
  requiring no infrastructure modification. We show that our algorithm
  adds minimal overhead while provably eliminating insecure
  intermediate states.

Session 7: Languages and Systems Security

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
Suresh Chari, Shai Halevi and Wietse Venema
  We analyze filename-based privilege escalation attacks, where victim
  programs are "tricked" into opening unintended files. Solutions to
  this problem nowadays are built into some applications, but we show
  that it can be solved in the file system itself (or a library), thus
  providing protection to all applications. Our solution build on a
  new name-resolution procedure, ensuring that files in "safe
  directories" cannot be opened using an "unsafe
  pathname". Comprehensive tests on several UNIX variants confirm that
  this solution is viable.

Joe-E: A Security-Oriented Subset of Java
Adrian Mettler, David Wagner and Tyler Close
  Joe-E is a subset of Java that makes it easier to architect and
  implement programs with strong security properties that can be
  checked during a security review. It enables programmers to apply
  the principle of least privilege to their programs; implement
  application-specific reference monitors that cannot be bypassed;
  introduce and use domain-specific security abstractions; safely
  execute and interact with untrusted code; and build secure,
  extensible systems. Joe-E provides object-capability security while
  retaining the features and feel of a mainstream language.

Preventing Capability Leaks in Secure JavaScript Subsets
Matthew Finifter, Joel Weinberger and Adam Barth
  To protect themselves from malicious web advertisements, publishers
  wish to sandbox ads. One popular approach is to statically verify
  that the ads conform to a "safe" subset of JavaScript that
  blacklists known-dangerous properties. We show this approach is
  insufficient because the ads can abuse new methods defined by the
  hosting page. We propose an improved subset based on whitelisting
  known-safe properties using namespaces.

Session 8: Malware

Binary Code Extraction and Interface Identification for Security Applications
Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song
  In this paper we conduct the first systematic study of binary code
  reuse, the process of automatically identifying the interface and
  extracting the instructions and data dependencies of a code fragment
  from the program's binary, so that it is self-contained and can be
  reused by external code. We propose a novel technique to identify
  the prototype of an undocumented code fragment directly from the
  program's binary, and use a combination of dynamic and static
  analysis to extract the code.

Automatic Reverse Engineering of Data Structures from Binary Execution
Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu
  In many security and forensics applications, it is desirable to
  uncover data structures in a binary program with their syntactic and
  semantic definitions. We present REWARDS, a reverse engineering
  technique that automatically reveals such information via dynamic
  analysis. By performing runtime data flow tracking, REWARDS
  identifies variables and resolves variable types based on
  type-revealing execution points encountered during execution. We
  demonstrate that REWARDS provides unique benefits to two
  applications: memory image forensics and binary fuzzing for
  vulnerability discovery.

Efficient Detection of Split Personalities in Malware
Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel and Giovanni Vigna
  A current challenge in malware analysis is detecting
  split-personality malware, i.e., malicious programs that, when run
  in an emulated or virtualized analysis environment, behave
  differently than on a real system. We developed a novel approach to
  detect such malware by first recording the malware's interaction
  with the operating system on an uninstrumented reference host and
  then leveraging the collected information to deterministically
  re-execute the program in a virtualized environment. If the
  malware's behavior is different, we conclude that the program has a
  split personality.

------
suzaki




Jsosug-users メーリングリストの案内
Back to archive index