4,988 research outputs found
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Running off-site software middleboxes at third-party service providers has
been a popular practice. However, routing large volumes of raw traffic, which
may carry sensitive information, to a remote site for processing raises severe
security concerns. Prior solutions often abstract away important factors
pertinent to real-world deployment. In particular, they overlook the
significance of metadata protection and stateful processing. Unprotected
traffic metadata like low-level headers, size and count, can be exploited to
learn supposedly encrypted application contents. Meanwhile, tracking the states
of 100,000s of flows concurrently is often indispensable in production-level
middleboxes deployed at real networks.
We present LightBox, the first system that can drive off-site middleboxes at
near-native speed with stateful processing and the most comprehensive
protection to date. Built upon commodity trusted hardware, Intel SGX, LightBox
is the product of our systematic investigation of how to overcome the inherent
limitations of secure enclaves using domain knowledge and customization. First,
we introduce an elegant virtual network interface that allows convenient access
to fully protected packets at line rate without leaving the enclave, as if from
the trusted source network. Second, we provide complete flow state management
for efficient stateful processing, by tailoring a set of data structures and
algorithms optimized for the highly constrained enclave space. Extensive
evaluations demonstrate that LightBox, with all security benefits, can achieve
10Gbps packet I/O, and that with case studies on three stateful middleboxes, it
can operate at near-native speed.Comment: Accepted at ACM CCS 201
TrusNet: Peer-to-Peer Cryptographic Authentication
Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages. Increasingly, the Internet is being used to transfer a new kind of data which it was never designed for. In most ways, this new data type fits in naturally to the Internet, taking advantage of the near limit-less expanse of the protocol. Hardware protocols, unlike previous data types, provide a unique set security problem. Much like financial data, hardware protocols extended across the Internet must be protected with authentication. Currently, systems which do authenticate do so through a central server, utilizing a similar authentication model to the HTTPS protocol. This hierarchical model is often at odds with the needs of hardware protocols, particularly in ad-hoc networks where peer-to-peer communication is prioritized over a hierarchical model. Our project attempts to implement a peer-to-peer cryptographic authentication protocol to be used to protect hardware protocols extending over the Internet.
The TrusNet project uses public-key cryptography to authenticate nodes on a distributed network, with each node locally managing a record of the public keys of nodes which it has encountered. These keys are used to secure data transmission between nodes and to authenticate the identities of nodes. TrusNet is designed to be used on multiple different types of network interfaces, but currently only has explicit hooks for Internet Protocol connections.
As of June 2016, TrusNet has successfully achieved a basic authentication and communication protocol on Windows 7, OSX, Linux 14 and the Intel Edison. TrusNet uses RC-4 as its stream cipher and RSA as its public-key algorithm, although both of these are easily configurable. Along with the library, TrusNet also enables the building of a unit testing suite, a simple UI application designed to visualize the basics of the system and a build with hooks into the I/O pins of the Intel Edison allowing for a basic demonstration of the system
Inclusion of Pupils with SENs into Mainstream Physical Education โ Potential Research Ideas to Explore Issues of Engagement
One consequence of the 1981 Education Act (DES, 1981) was that there began a transference of pupils from special educational schools to mainstream schools over the coming years. Thus, for the first time in many cases, mainstream schools were expected, through policy developments, to provide an inclusive education culture for pupils with SEN (Special Educational Needs). The aim of this paper is to analyse some of the consequences, intended or otherwise, of including pupils with SEN in mainstream school National Curriculum Physical Education (NCPE) lessons and extra-curricular physical activity. In this regard, it is argued that team games and competitive sports are activities which teachers find particularly difficult to plan for and deliver in an inclusive way, whereas more individual activities such as dance, gymnastics, tennis, badminton and athletics are identified as activities that may be easier to plan and deliver inclusively. The paper is punctuated with potential field research ideas; being possible investigations prompted by this critique of literature. These ideas typically involve suggestions for primary data gathering in the school setting with either pupils or staff, exploring issues for engagement (and non-engagement) with PE and physical activity. The paper concludes that an over emphasis upon competitive team sports and performance in PE may be eroding the quality of learning experience for all pupils, not least those with SEN
Machine-Learning based analysis and classification of Android malware signatures
Multi-scanner Antivirus (AV) systems are often used for detecting Android malware since the same piece of software can be checked against multiple different AV engines. However, in many cases the same software application is flagged as malware by few AV engines, and often the signatures provided contradict each other, showing a clear lack of consensus between different AV engines. This work analyzes more than 80 thousand Android applications flagged as malware by at least one AV engine, with a total of almost 260 thousand malware signatures. In the analysis, we identify 41 different malware families, we study their relationships and the relationships between the AV engines involved in such detections, showing that most malware cases belong to either Adware abuse or really dangerous Harmful applications, but some others are unspecified (or Unknown). With the help of Machine Learning and Graph Community Algorithms, we can further combine the different AV detections to classify such Unknown apps into either Adware or Harmful risks, reaching F1-score above 0.84.The authors would like to acknowledge the support of the national project TEXEO (TEC2016-80339-R), funded by the Ministerio de Economia y Competitividad of SPAIN through, and the EU-funded H2020 SMOOTH project, Spain (grant no. H2020-786741). Similarly, the authors would like to remark the support provided by the Tacyt system (https://www.elevenpaths.com/es/te cnologia/tacyt/index.html) for the collection and labeling of AV information. Finally, Ignacio Martin would like to acknowledge the support granted by the Spanish Ministry of education through the FPU scholarship he holds (FPU15/03518)
An Analysis of Electromagnetic Interference (EMI) of Ultra Wideband(UWB) and IEEE 802.11A Wireless Local Area Network (WLAN) Employing Orthogonal Frequency Division Multiplexing (OFDM)
Military communications require the rapid deployment of mobile, high-bandwidth systems. These systems must provide anytime, anywhere capabilities with minimal interference to existing military, private, and commercial communications. Ultra Wideband (UWB) technology is being advanced as the next generation radio technology and has the potential to revolutionize indoor wireless communications. The ability of UWB to mitigate multipath fading, provide high-throughput data rates (e.g., greater than 100 Mbps), provide excellent signal penetration (e.g., through walls), and low implementation costs makes it an ideal technology for a wide range of private and public sector applications. Preliminary UWB studies conducted by The Institute for Telecommunications Science (ITS) and the Defense Advanced Research Projects Agency (DARPA) have discovered that potential exists for harmful interference to occur. While these studies have provided initial performance estimates, the interference effects of UWB transmissions on coexisting spectral users are largely unknown. This research characterizes the electromagnetic interference (EMI) effects of UWB on the throughput performance of an IEEE 802.11a ad-hoc network. Radiated measurements in an anechoic chamber investigate interference performance using three modulation schemes (BPSK, BPPM, and OOK) and four pulse repetition frequencies over two Unlicensed National Information Infrastructure (U-NII) channels. Results indicate that OOK and BPPM can degrade throughput performance by up to 20% at lower pulse repetition frequencies (PRFs) in lower U-NII channels. Minimal performance degradation (less than one percent) due to interference was observed for BPSK at the lower PRFs and higher U-NII channels
The relationship between sustainability and contemporary fashion design: an analysis of the segment jeanswear
Fashion is one of the reflexes that best expresses the dynamics of contemporary, and sustainability is one of the questioner agents of the concept and approach of fashion and fashion design, this way, the purpose of this paper is to present a critical analysis of the relationship between fashion and sustainability, with the aim of comparing and verifying the discourses of advocated by jeanswear segment companies and the development of its garments, called โsustainableโ. The reasoning begins from literature review of these areas added to field research with structured interviews, application of questionnaires and later analysis of companies
Recommended from our members
Computing infrastructure issues in distributed communications systems : a survey of operating system transport system architectures
The performance of distributed applications (such as file transfer, remote login, tele-conferencing, full-motion video, and scientific visualization) is influenced by several factors that interact in complex ways. In particular, application performance is significantly affected both by communication infrastructure factors and computing infrastructure factors. Several communication infrastructure factors include channel speed, bit-error rate, and congestion at intermediate switching nodes. Computing infrastructure factors include (among other things) both protocol processing activities (such as connection management, flow control, error detection, and retransmission) and general operating system factors (such as memory latency, CPU speed, interrupt and context switching overhead, process architecture, and message buffering). Due to a several orders of magnitude increase in network channel speed and an increase in application diversity, performance bottlenecks are shifting from the network factors to the transport system factors.This paper defines an abstraction called an "Operating System Transport System Architecture" (OSTSA) that is used to classify the major components and services in the computing infrastructure. End-to-end network protocols such as TCP, TP4, VMTP, XTP, and Delta-t typically run on general-purpose computers, where they utilize various operating system resources such as processors, virtual memory, and network controllers. The OSTSA provides services that integrate these resources to support distributed applications running on local and wide area networks.A taxonomy is presented to evaluate OSTSAs in terms of their support for protocol processing activities. We use this taxonomy to compare and contrast five general-purpose commercial and experimental operating systems including System V UNIX, BSD UNIX, the x-kernel, Choices, and Xinu
๋ฉ๋ชจ๋ฆฌ ๋ณดํธ๋ฅผ ์ํ ๋ณด์ ์ ์ฑ ์ ์ํํ๊ธฐ ์ํ ์ฝ๋ ๋ณํ ๊ธฐ์
ํ์๋
ผ๋ฌธ(๋ฐ์ฌ)--์์ธ๋ํ๊ต ๋ํ์ :๊ณต๊ณผ๋ํ ์ ๊ธฐยท์ปดํจํฐ๊ณตํ๋ถ,2020. 2. ๋ฐฑ์คํฅ.Computer memory is a critical component in computer systems that needs to be protected to ensure the security of computer systems. It contains security sensitive data that should not be disclosed to adversaries. Also, it contains the important data for operating the system that should not be manipulated by the attackers. Thus, many security solutions focus on protecting memory so that sensitive data cannot be leaked out of the computer system or on preventing illegal access to computer data. In this thesis, I will present various code transformation techniques for enforcing security policies for memory protection. First, I will present a code transformation technique to track implicit data flows so that security sensitive data cannot leak through implicit data flow channels (i.e., conditional branches). Then I will present a compiler technique to instrument C/C++ program to mitigate use-after-free errors, which is a type of vulnerability that allow illegal access to stale memory location. Finally, I will present a code transformation technique for low-end embedded devices to enable execute-only memory, which is a strong security policy to protect secrets and harden the computing device against code reuse attacks.์ปดํจํฐ ๋ฉ๋ชจ๋ฆฌ๋ ์ปดํจํฐ ์์คํ
์ ๋ณด์์ ์ํด ๋ณดํธ๋์ด์ผ ํ๋ ์ค์ํ ์ปดํฌ๋ํธ์ด๋ค. ์ปดํจํฐ ๋ฉ๋ชจ๋ฆฌ๋ ๋ณด์์ ์ค์ํ ๋ฐ์ดํฐ๋ฅผ ๋ด๊ณ ์์ ๋ฟ๋ง ์๋๋ผ, ์์คํ
์ ์ฌ๋ฐ๋ฅธ ๋์์ ์ํด ๊ณต๊ฒฉ์์ ์ํด ์กฐ์๋์ด์๋ ์๋๋ ์ค์ํ ๋ฐ์ดํฐ ๊ฐ๋ค์ ์ ์ฅํ๋ค. ๋ฐ๋ผ์ ๋ง์ ๋ณด์ ์๋ฃจ์
์ ๋ฉ๋ชจ๋ฆฌ๋ฅผ ๋ณดํธํ์ฌ ์ปดํจํฐ ์์คํ
์์ ์ค์ํ ๋ฐ์ดํฐ๊ฐ ์ ์ถ๋๊ฑฐ๋ ์ปดํจํฐ ๋ฐ์ดํฐ์ ๋ํ ๋ถ๋ฒ์ ์ธ ์ ๊ทผ์ ๋ฐฉ์งํ๋ ๋ฐ ์ค์ ์ ๋๋ค. ๋ณธ ๋
ผ๋ฌธ์์๋ ๋ฉ๋ชจ๋ฆฌ ๋ณดํธ๋ฅผ ์ํ ๋ณด์ ์ ์ฑ
์ ์ํํ๊ธฐ ์ํ ๋ค์ํ ์ฝ๋ ๋ณํ ๊ธฐ์ ์ ์ ์ํ๋ค. ๋จผ์ , ํ๋ก๊ทธ๋จ์์ ๋ถ๊ธฐ๋ฌธ์ ํตํด ๋ณด์์ ๋ฏผ๊ฐํ ๋ฐ์ดํฐ๊ฐ ์ ์ถ๋์ง ์๋๋ก ์์์ ๋ฐ์ดํฐ ํ๋ฆ์ ์ถ์ ํ๋ ์ฝ๋ ๋ณํ ๊ธฐ์ ์ ์ ์ํ๋ค. ๊ทธ ๋ค์์ผ๋ก C / C ++ ํ๋ก๊ทธ๋จ์ ๋ณํํ์ฌ use-after-free ์ค๋ฅ๋ฅผ ์ํํ๋ ์ปดํ์ผ๋ฌ ๊ธฐ์ ์ ์ ์ํ๋ค. ๋ง์ง๋ง์ผ๋ก, ์ค์ ๋ฐ์ดํฐ๋ฅผ ๋ณดํธํ๊ณ ์ฝ๋ ์ฌ์ฌ์ฉ ๊ณต๊ฒฉ์ผ๋ก๋ถํฐ ๋๋ฐ์ด์ค๋ฅผ ๊ฐํํ ์ ์๋ ๊ฐ๋ ฅํ ๋ณด์ ์ ์ฑ
์ธ ์คํ ์ ์ฉ ๋ฉ๋ชจ๋ฆฌ(execute-only memory)๋ฅผ ์ ์ฌ์ ์๋ฒ ๋๋ ๋๋ฐ์ด์ค์ ๊ตฌํํ๊ธฐ ์ํ ์ฝ๋ ๋ณํ ๊ธฐ์ ์ ์ ์ํ๋ค.1 Introduction 1
2 Background 4
3 A Hardware-based Technique for Efficient Implicit Information Flow Tracking 8
3.1 Introduction 8
3.2 Related Work 10
3.3 Our Approach for Implicit Flow Tracking 12
3.3.1 Implicit Flow Tracking Scheme with Program Counter Tag 12
3.3.2 tP C Management Technique 15
3.3.3 Compensation for the Untaken Path 20
3.4 Architecture Design of IFTU 22
3.4.1 Overall System 22
3.4.2 Tag Computing Core 24
3.5 Performance and Area Analysis 26
3.6 Security Analysis 28
3.7 Summary 30
4 CRCount: Pointer Invalidation with Reference Counting to Mitigate Useafter-free in Legacy C/C++ 31
4.1 Introduction 31
4.2 Related Work 36
4.3 Threat Model 40
4.4 Implicit Pointer Invalidation 40
4.4.1 Invalidation with Reference Counting 40
4.4.2 Reference Counting in C/C++ 42
4.5 Design 44
4.5.1 Overview 45
4.5.2 Pointer Footprinting 46
4.5.3 Delayed Object Free 50
4.6 Implementation 53
4.7 Evaluation 56
4.7.1 Statistics 56
4.7.2 Performance Overhead 58
4.7.3 Memory Overhead 62
4.8 Security Analysis 67
4.8.1 Attack Prevention 68
4.8.2 Security considerations 69
4.9 Limitations 69
4.10 Summary 71
5 uXOM: Efficient eXecute-Only Memory on ARM Cortex-M 73
5.1 Introduction 73
5.2 Background 78
5.2.1 ARMv7-M Address Map and the Private Peripheral Bus (PPB) 78
5.2.2 Memory Protection Unit (MPU) 79
5.2.3 Unprivileged Loads/Stores 80
5.2.4 Exception Entry and Return 80
5.3 Threat Model and Assumptions 81
5.4 Approach and Challenges 82
5.5 uXOM 85
5.5.1 Basic Design 85
5.5.2 Solving the Challenges 89
5.5.3 Optimizations 98
5.5.4 Security Analysis 99
5.6 Evaluation 100
5.6.1 Runtime Overhead 103
5.6.2 Code Size Overhead 106
5.6.3 Energy Overhead 107
5.6.4 Security and Usability 107
5.6.5 Use Cases 108
5.7 Discussion 110
5.8 Related Work 111
5.9 Summary 113
6 Conclusion and Future Work 114
6.1 Future Work 115
Abstract (In Korean) 132
Acknowlegement 133Docto
- โฆ